11
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Contemporary Cryptography: The Imperatives of its Implementation

Pages 175-180 | Published online: 26 Mar 2015

REFERENCES

  • Adam Young & Moti Yung, Bandwidth-Optimal Kleptographic Attacks, pp 235–250, Cryptographic Hardware and Embedded Systems—CHES 2001, (Eds. Cetin K Koc, David Naccache, Christof Paar), Springer.
  • Mihir Bellare, Marc Fischlin, Shafi Goldwasser & Silvio Micali, Identification Protocols Secure against Reset Attacks, pp 495–511, Advances in Cryptology EUROCRYPT 2001, Ed Birgit Pfitzmann, Springer.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.