Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by A.K. Lenstra
Multi-Exponentiation (Cryptographic Protocols)
IEE Proceedings - Computers and Digital Techniques
Related publications
Programming Cryptographic Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Cryptographic Protocols From Lattices
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Cryptographic Protocols for Electronic Voting
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
First-Order Verification of Cryptographic Protocols
Journal of Computer Security
Risk
Computer Networks
Hardware
Communications
Reliability
Safety
Architecture
Quality
Software
Resource Fairness and Composability of Cryptographic Protocols
Journal of Cryptology
Applied Mathematics
Computer Science Applications
Software
G2C: Cryptographic Protocols From Goal-Driven Specifications
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Resource Fairness and Composability of Cryptographic Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Equivalence Properties by Typing in Cryptographic Branching Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Model Checking Cryptographic Protocols With Interval Temporal Logic
Journal of Convergence Information Technology