Author of the publication

MAC Precomputation with Applications to Secure Memory.

, , and . ISC, volume 5735 of Lecture Notes in Computer Science, page 427-442. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Long-Lived Renaming Made Fast., , , and . PODC, page 194-203. ACM, (1995)Fast, Long-Lived Renaming Improved and Simplified (Abstract)., and . PODC, page 152. ACM, (1996)Efficient Distributed Consensus with n = (3 + epsilon) t Processors (Extended Abstract)., and . WDAG, volume 579 of Lecture Notes in Computer Science, page 129-142. Springer, (1991)Optimal Early Stopping in Distributed Consensus (Extended Abstract)., , and . WDAG, volume 647 of Lecture Notes in Computer Science, page 221-237. Springer, (1992)MAC Precomputation with Applications to Secure Memory., , and . ISC, volume 5735 of Lecture Notes in Computer Science, page 427-442. Springer, (2009)The Bitcoin Backbone Protocol: Analysis and Applications., , and . EUROCRYPT (2), volume 9057 of Lecture Notes in Computer Science, page 281-310. Springer, (2015)Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX., , , and . USENIX Security Symposium, USENIX Association, (1995)Adaptive Video on Demand., , and . ESA, volume 979 of Lecture Notes in Computer Science, page 538-553. Springer, (1995)Preliminary Analysis of Page Reference Strings of an Interactive System., , and . Int. CMG Conference, page 94-105. Computer Measurement Group, (1985)Long-Lived Broadcast Encryption., , and . CRYPTO, volume 1880 of Lecture Notes in Computer Science, page 333-352. Springer, (2000)