Cryptography

Results: 21893



#Item
1-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1  University of Cincinnati and Technische Universität Darmstadt

-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1 University of Cincinnati and Technische Universität Darmstadt

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-03-20 04:03:42
2Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1  3

Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2012-04-04 23:26:12
3ECE/CS498: Applied Cryptography  Instructor: Andrew Miller, TA: Kevin Liao Lecture 2: Interactive Proofs 1

ECE/CS498: Applied Cryptography Instructor: Andrew Miller, TA: Kevin Liao Lecture 2: Interactive Proofs 1

Add to Reading List

Source URL: gitlab-beta.engr.illinois.edu

Language: English
4The Art of Cryptography Zero Knowledge Proofs Abhiram Kothapalli  Two Balls and the Color-Blind Friend

The Art of Cryptography Zero Knowledge Proofs Abhiram Kothapalli Two Balls and the Color-Blind Friend

Add to Reading List

Source URL: abhiram.me

Language: English - Date: 2018-10-12 13:22:58
5Multivariate Cryptography Louis Goubin, Versailles St-Quentin-en-Yvelines University, France, Jacques Patarin, Versailles St-Quentin-en-Yvelines University, France, and Bo-Yin Yang, Institute of Information Science, Acad

Multivariate Cryptography Louis Goubin, Versailles St-Quentin-en-Yvelines University, France, Jacques Patarin, Versailles St-Quentin-en-Yvelines University, France, and Bo-Yin Yang, Institute of Information Science, Acad

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2013-03-31 09:28:56
6ECE/CS498: Applied Cryptography  Instructor: Andrew Miller, TA: Kevin Liao Lecture 1: Group Theory 1

ECE/CS498: Applied Cryptography Instructor: Andrew Miller, TA: Kevin Liao Lecture 1: Group Theory 1

Add to Reading List

Source URL: gitlab-beta.engr.illinois.edu

Language: English
7Hash-based signatures Joost Rijneveld  Radboud University, Nijmegen, The Netherlands  Post-quantum cryptography

Hash-based signatures Joost Rijneveld Radboud University, Nijmegen, The Netherlands Post-quantum cryptography

Add to Reading List

Source URL: joostrijneveld.nl

Language: English - Date: 2018-06-21 04:41:26
8Tenth International Conference on Post-Quantum Cryptography  PQCrypto 2019 Chongqing, China, May 8–10, 2019 pqcrypto2019.org

Tenth International Conference on Post-Quantum Cryptography PQCrypto 2019 Chongqing, China, May 8–10, 2019 pqcrypto2019.org

Add to Reading List

Source URL: pqcrypto2019.org

Language: English - Date: 2018-10-01 11:44:48
9Multivariate Public Key Cryptography Jintai Ding 1  2

Multivariate Public Key Cryptography Jintai Ding 1 2

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2013-03-10 22:42:02
10Implementing Post-Quantum Cryptography on the Cortex M4 Matthias Kannwischer, Joost Rijneveld, Peter Schwabe, and Ko Stoffelen Radboud University, Nijmegen, The Netherlands

Implementing Post-Quantum Cryptography on the Cortex M4 Matthias Kannwischer, Joost Rijneveld, Peter Schwabe, and Ko Stoffelen Radboud University, Nijmegen, The Netherlands

Add to Reading List

Source URL: joostrijneveld.nl

Language: English - Date: 2018-09-12 10:43:16