Colin D. Walter
According to our database1,
Colin D. Walter
authored at least 46 papers
between 1983 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2017
IACR Cryptol. ePrint Arch., 2017
2014
An Overview of PIC Microcontrollers and Their Suitability for Cryptographic Algorithms.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
A Record Composition/Decomposition attack on the NDEF Signature Record Type Definition.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
2010
Proceedings of the Information Security Applications - 11th International Workshop, 2010
2009
Proceedings of the Cryptography and Coding, 2009
Proceedings of the Cryptographic Engineering, 2009
Proceedings of the Cryptographic Engineering, 2009
2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
2007
Proceedings of the Information Security Applications, 8th International Workshop, 2007
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the 17th IEEE Symposium on Computer Arithmetic (ARITH-17 2005), 2005
2004
Proceedings of the Topics in Cryptology, 2004
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004
2003
J. VLSI Signal Process., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
Proceedings of the Cryptography and Coding, 2003
Proceedings of the Topics in Cryptology, 2003
2002
MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis.
Proceedings of the Topics in Cryptology, 2002
Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli.
Proceedings of the Topics in Cryptology, 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002
2001
Proceedings of the Topics in Cryptology, 2001
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001
Proceedings of the 15th IEEE Symposium on Computer Arithmetic (Arith-15 2001), 2001
2000
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000
1999
Softw. Pract. Exp., 1999
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999
Proceedings of the 14th IEEE Symposium on Computer Arithmetic (Arith-14 '99), 1999
1998
1997
Space/Time Trade-Offs for Higher Radix Modular Multiplication Using Repeated Addition.
IEEE Trans. Computers, 1997
Proceedings of the Algebraic and Logic Programming, 6th International Joint Conference, 1997
1995
Microprocess. Microsystems, 1995
1993
IEEE Trans. Computers, 1993
1991
Proceedings of the Advances in Cryptology, 1991
1986
Microprocessor interfacing and communication using the Intel SDK-85: Borivoje Furht and Himanshu Parikh Prentice-Hall Reston, Englewood Cliffs, NJ, USA (April 1986) £31.00 pp 499.
Microprocess. Microsystems, 1986
1983
J. Comb. Theory B, 1983