Crypto

Results: 1625



#Item
91Cryptocurrencies / Alternative currencies / Economy / Money / Digital currencies / Bitcoin / Finance / Decentralization / Draft:Masternode / Dash / CoinJoin / Blockchain

Dash: A Privacy­Centric Crypto­Currency    Evan Duffield ­ ​   Daniel Diaz ­ ​  

Add to Reading List

Source URL: blockchainlab.com

Language: English - Date: 2017-04-20 00:53:00
92

Rounded Gaussians Fast and Secure Constant-Time Sampling for Lattice-Based Crypto Andreas H¨ ulsing, Tanja Lange, Kit Smeets Department of Mathematics and Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-10-16 08:15:31
    93

    Profit from Digital Assets Participate in the extraordinary growth in domain names and crypto currencies. Introduction Vision DDF is a fund to invest in digital assets, designed to reduce

    Add to Reading List

    Source URL: www.digitaldevelopersfund.com

    Language: English - Date: 2017-08-03 05:00:36
      94

      Commercial Break Summer school on post-quantum crypto Eindhoven, 19–23 June 2017 https://2017.pqcrypto.org/school/index.html Executive school on post-quantum crypto

      Add to Reading List

      Source URL: hyperelliptic.org

      Language: English - Date: 2017-01-28 21:23:45
        95Cryptocurrencies / Digital currencies / Economy / Alternative currencies / Money / Financial technology / Bitcoin / Finance / Draft:CINDX

        Taklimakan Network 2018 | Ver. 2.0 WHITEPAPER Investment and educational business platform for crypto

        Add to Reading List

        Source URL: taklimakan.io

        Language: English - Date: 2018-07-25 10:51:15
        96

        Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

        Add to Reading List

        Source URL: crypto.stanford.edu

        Language: English - Date: 2010-06-04 16:24:13
          97

          An introduction to supersingular isogeny-based cryptography Craig Costello Summer School on Real-World Crypto and Privacy June 8, 2017

          Add to Reading List

          Source URL: www.craigcostello.com.au

          Language: English - Date: 2017-06-10 05:08:02
            98Computing / Internet privacy / Internet / Proxy servers / System software / Cryptographic software / Internet security / Internet censorship / Flash proxy / WebSocket / Tor / Content-control software

            Evading Censorship with Browser-Based Proxies David Fifield1 , Nate Hardison1 , Jonathan Ellithorpe1 , Emily Stark2 , Dan Boneh1 , Roger Dingledine3 , and Phil Porras4 1 2

            Add to Reading List

            Source URL: crypto.stanford.edu

            Language: English - Date: 2012-05-01 13:41:51
            99

            Crypto Evaluation Processes

            Add to Reading List

            Source URL: www.yourcreativesolutions.nl

            Language: English - Date: 2011-09-21 17:56:42
              100

              M2 CRYPTO TP THÉORIE ALGORITHMIQUE DES NOMBRES CHRISTOPHE RITZENTHALER 1. Réseaux Exercice 1. Implémenter l’algorithme de Gauss. On devra utiliser la fonction while

              Add to Reading List

              Source URL: perso.univ-rennes1.fr

              Language: French - Date: 2016-02-07 03:06:17
                UPDATE