- Low-Latency Mix Networks:
Attacks and Defenses".
Computer Security –
ESORICS 2006.
ESORICS'06. Vol. 4189. pp. 18–33. CiteSeerX 10.1.1.64.8818. doi:10.1007/11863908_2...
- (2022). "On
Committing Authenticated-Encryption".
Computer Security –
ESORICS 2022. Vol. 13555. Cham:
Springer Nature Switzerland. doi:10.1007/978-3-031-17146-8_14...
-
Claus P. Schnorr, the RSA
Award for
Excellence in
Mathematics and the
ESORICS Outstanding Research Award in 2013. On Sa****ay, 1
February 2014, Flemish...
- classic" (PDF). 13th
European Symposium on
Research in
Computer Security (
ESORICS 2008), LNCS, Springer.
Archived from the
original (PDF) on 23 February...
-
Strikes again:
Breaking PKCS#1 v1.5 in XML Encryption",
Computer Security –
ESORICS 2012,
Springer Berlin Heidelberg, pp. 752–769, CiteSeerX 10.1.1.696.5641...
- (September 21–23, 2009). Data
Structures with
Unpredictable Timing (PDF).
ESORICS 2009, 14th
European Symposium on
Research in
Computer Security. Saint-Malo...
- Mathi****en, On the Role of Key
Schedules in
Attacks on
Iterated Ciphers,
ESORICS 2004, pp322–334. Uri
Blumenthal and
Steven M. Bellovin, A
Better Key Schedule...
-
Malleability and MtGox.
European Symposium on
Research in
Computer Security—
ESORICS.
Lecture Notes in
Computer Science. Vol. 8713. Springer. pp. 313–326. arXiv:1403...
- (2022). "Zero-Knowledge Age
Restriction for GNU Taler".
Computer Security –
ESORICS 2022.
Lecture Notes in
Computer Science. Vol. 13554. pp. 110–129. doi:10...
-
blockchains via
compressed discrete-log
lookup tables. CBT
workshop 2021 (
ESORICS).
Retrieved 2021-09-07.
Steven D. Galbraith, Ping Wang and
Fangguo Zhang...