Publication
Hash Functions: From Merkle-Damgård to Shoup
Publication
Practical Byzantine Fault Tolerance
Publication
Improved Online/Offline Signature Schemes
Publication
How to Leak a Secret
Publication
Computer Security in the Real World
Publication