1![Efficient Cryptography on RISC-V Advisor(s): Thomas Unterluggauer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation Efficient Cryptography on RISC-V Advisor(s): Thomas Unterluggauer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation](https://www.pdfsearch.io/img/ce384018b18863e8ba79a3ca5b7ecb95.jpg) | Add to Reading ListSource URL: www.iaik.tugraz.atLanguage: English - Date: 2015-11-30 11:00:03
|
---|
2![Functional Signcryption: Notion, Construction, and Applications by Pratish Datta joint work with Functional Signcryption: Notion, Construction, and Applications by Pratish Datta joint work with](https://www.pdfsearch.io/img/f62a6ddf495e68930c2a90995877ee74.jpg) | Add to Reading ListSource URL: security-lab.jaist.ac.jpLanguage: English - Date: 2015-11-22 02:25:24
|
---|
3![ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal](https://www.pdfsearch.io/img/9734573c30773e6c434fd4ab2d1b16b9.jpg) | Add to Reading ListSource URL: www.ijmetmr.comLanguage: English - Date: 2015-06-05 03:04:49
|
---|
4![Joshua Erin Hill Résumé The machine does not isolate man from the great problems of nature but plunges him more deeply into them. – Antoine de Saint-Exupéry Joshua Erin Hill Résumé The machine does not isolate man from the great problems of nature but plunges him more deeply into them. – Antoine de Saint-Exupéry](https://www.pdfsearch.io/img/e0ca7fdc511d94a2b3f12ce25300c214.jpg) | Add to Reading ListSource URL: untruth.orgLanguage: English - Date: 2016-06-07 14:19:23
|
---|
5![Abstracting Cryptographic Protocols with Tree Automata ? David Monniaux http://www.di.ens.fr/%7Fmonniaux, ´ Laboratoire d’Informatique, Ecole Abstracting Cryptographic Protocols with Tree Automata ? David Monniaux http://www.di.ens.fr/%7Fmonniaux, ´ Laboratoire d’Informatique, Ecole](https://www.pdfsearch.io/img/3beb8f2d687a6f4e6f86de6659680ab4.jpg) | Add to Reading ListSource URL: www-verimag.imag.frLanguage: English - Date: 2007-10-18 09:44:59
|
---|
6![Verification of a Cryptographic Primitive: SHA-256 ANDREW W. APPEL, Princeton University A full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is an interactive proof of f Verification of a Cryptographic Primitive: SHA-256 ANDREW W. APPEL, Princeton University A full formal machine-checked verification of a C program: the OpenSSL implementation of SHA-256. This is an interactive proof of f](https://www.pdfsearch.io/img/bf4926493960d5a04d2d44f27ded2fdc.jpg) | Add to Reading ListSource URL: www.cs.princeton.eduLanguage: English - Date: 2014-12-23 10:16:22
|
---|
7![LNCSOn Robust Combiners for Private Information Retrieval and Other Primitives LNCSOn Robust Combiners for Private Information Retrieval and Other Primitives](https://www.pdfsearch.io/img/ea479fbd6988e91a305c98eb69e56906.jpg) | Add to Reading ListSource URL: dcg.ethz.chLanguage: English - Date: 2014-09-26 08:36:31
|
---|
8![Very-efficient simulatable flipping of many coins into a well (and a new very-efficient extractable-and-equivocable commitment scheme) Luís T. A. N. Brandão∗ (Technical report – June 28, Abstract. Secure two Very-efficient simulatable flipping of many coins into a well (and a new very-efficient extractable-and-equivocable commitment scheme) Luís T. A. N. Brandão∗ (Technical report – June 28, Abstract. Secure two](https://www.pdfsearch.io/img/8894e1130bfb81d618317283d53942e7.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-06-28 21:51:08
|
---|
9![- Call for papers The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: t.a - Call for papers The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: t.a](https://www.pdfsearch.io/img/3bb7610d841b8055df5eaa4c5ba45a49.jpg) | Add to Reading ListSource URL: security-lab.jaist.ac.jpLanguage: English - Date: 2015-08-13 01:39:17
|
---|
10![ESORICS 2015 Program Guide ESORICS only 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.org ESORICS 2015 Program Guide ESORICS only 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.org](https://www.pdfsearch.io/img/a7f41ced4a7c6a79fc666172142f8e2b.jpg) | Add to Reading ListSource URL: esorics2015.sba-research.orgLanguage: English - Date: 2015-09-22 04:03:47
|
---|