| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2012 | J | jnl |
J. Cryptol.
|
| 2012 | — | conf |
AFRICACRYPT
|
| 2012 | — | conf |
Cryptography and Security
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | J | jnl |
J. Cryptol.
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2009 | — | ch. |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes
|
| 2009 | B | conf |
Selected Areas in Cryptography
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | Misc | conf |
WISA
|
| 2009 | — | conf |
Symmetric Cryptography
|
| 2009 | A* | conf |
FSE
|
| 2009 | B | conf |
Selected Areas in Cryptography
|
| 2009 | — | conf |
Symmetric Cryptography
|
| 2009 | — | conf |
Symmetric Cryptography
|
| 2008 | Misc | conf |
INDOCRYPT
|
| 2008 | A* | conf |
EUROCRYPT
|
| 2008 | B | conf |
Selected Areas in Cryptography
|
| 2008 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2008 | C | conf |
ISC
|
| 2007 | — | conf |
WEWoRC
|