Springer, Journal of Cryptographic Engineering, 1(2), p. 75-75, 2012
DOI: 10.1007/s13389-011-0026-7
Springer Verlag, Journal of Cryptographic Engineering, 4(1), p. 271-281
DOI: 10.1007/s13389-011-0024-9
Export citation
Search in Google Scholar
Full text: Download