Cryptographic engineering

Results: 331



#Item
1Published in Journal of Cryptographic Engineering, 6(3):187–199, Inversion-Free Arithmetic on Elliptic Curves Through Isomorphisms Raveen R. Goundar · Marc Joye

Published in Journal of Cryptographic Engineering, 6(3):187–199, Inversion-Free Arithmetic on Elliptic Curves Through Isomorphisms Raveen R. Goundar · Marc Joye

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2016-08-27 14:33:22
    2Published in Journal of Cryptographic Engineering 1(2):161–176, Scalar Multiplication on Weierstraß Elliptic Curves from Co-Z Arithmetic Raveen R. Goundar · Marc Joye · Atsuko Miyaji · Matthieu Rivain · Ale

    Published in Journal of Cryptographic Engineering 1(2):161–176, Scalar Multiplication on Weierstraß Elliptic Curves from Co-Z Arithmetic Raveen R. Goundar · Marc Joye · Atsuko Miyaji · Matthieu Rivain · Ale

    Add to Reading List

    Source URL: joye.site88.net

    Language: English - Date: 2015-09-04 19:43:36
      3AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1  Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

      AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

      Add to Reading List

      Source URL: web.cs.ucdavis.edu

      Language: English - Date: 2015-02-21 21:04:37
      42015 IEEE Symposium on Security and Privacy  TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits Ebrahim M. Songhori∗ , Siam U. Hussain∗ , Ahmad-Reza Sadeghi† , Thomas Schneider† , Farinaz Kous

      2015 IEEE Symposium on Security and Privacy TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits Ebrahim M. Songhori∗ , Siam U. Hussain∗ , Ahmad-Reza Sadeghi† , Thomas Schneider† , Farinaz Kous

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2015-05-11 16:43:20
      5Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II Solutions

      Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II Solutions

      Add to Reading List

      Source URL: css.csail.mit.edu

      Language: English - Date: 2016-01-29 11:50:05
      6Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream∗ Michael Mitzenmacher† Salil Vadhan‡ School of Engineering & Applied Sciences Harvard University

      Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream∗ Michael Mitzenmacher† Salil Vadhan‡ School of Engineering & Applied Sciences Harvard University

      Add to Reading List

      Source URL: www.eecs.harvard.edu

      Language: English - Date: 2007-11-16 13:42:30
      7L1 - Faster Development and Benchmarking of Cryptographic Protocols Axel Schr¨opfer, Florian Kerschbaum, Debmalya Biswas, Steffen Geißinger, and Christoph Sch¨ utz SAP Research Karlsruhe, Germany

      L1 - Faster Development and Benchmarking of Cryptographic Protocols Axel Schr¨opfer, Florian Kerschbaum, Debmalya Biswas, Steffen Geißinger, and Christoph Sch¨ utz SAP Research Karlsruhe, Germany

      Add to Reading List

      Source URL: www.fkerschbaum.org

      Language: English - Date: 2009-09-30 17:02:37
      8Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

      Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

      Add to Reading List

      Source URL: css.csail.mit.edu

      Language: English - Date: 2016-01-29 11:50:05
      9Crypto Compiler Advisor(s): David Derler, Christian Hanser, Daniel Slamanig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

      Crypto Compiler Advisor(s): David Derler, Christian Hanser, Daniel Slamanig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

      Add to Reading List

      Source URL: www.iaik.tugraz.at

      Language: English - Date: 2015-09-08 06:00:03
      10Mr. Housley is the Founder of Vigil Security, LLC, and he is coauthor of “Planning for PKI” and “Implementing Email and Security Tokens” published by John Wiley & Sons. He has over 30 years of communications and

      Mr. Housley is the Founder of Vigil Security, LLC, and he is coauthor of “Planning for PKI” and “Implementing Email and Security Tokens” published by John Wiley & Sons. He has over 30 years of communications and

      Add to Reading List

      Source URL: www.ianacg.org

      Language: English - Date: 2015-02-06 01:41:13