Cryptography

Results: 21893



#Item
91This is Chapter 7 by Gerhard Frey and Tanja Lange of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC PressCRC Press has granted the foll

This is Chapter 7 by Gerhard Frey and Tanja Lange of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC PressCRC Press has granted the foll

Add to Reading List

Source URL: hyperelliptic.org

Language: English - Date: 2014-03-13 14:22:38
    92Cryptography Working Group

    Cryptography Working Group

    Add to Reading List

    Source URL: www.win.tue.nl

    - Date: 2016-03-22 07:04:06
      93USING TIMED-RELEASE CRYPTOGRAPHY TO MITIGATE PRESERVATION RISK OF EMBARGO PERIODS by Rabia Haq B.S. August 2004, Old Dominion University

      USING TIMED-RELEASE CRYPTOGRAPHY TO MITIGATE PRESERVATION RISK OF EMBARGO PERIODS by Rabia Haq B.S. August 2004, Old Dominion University

      Add to Reading List

      Source URL: www.cs.odu.edu

      Language: English - Date: 2009-12-04 17:52:42
        94Cryptography, homework sheet 4 Due for 2MMC10: 06 October 2016, 10:45 and for Mastermath: 03 November 2016, 10:45 by email to  Team up in groups of two or three to hand in your homework. We do not hav

        Cryptography, homework sheet 4 Due for 2MMC10: 06 October 2016, 10:45 and for Mastermath: 03 November 2016, 10:45 by email to Team up in groups of two or three to hand in your homework. We do not hav

        Add to Reading List

        Source URL: www.hyperelliptic.org

        Language: English - Date: 2016-09-29 12:48:05
          95This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

          This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

          Add to Reading List

          Source URL: cacr.uwaterloo.ca

          Language: English - Date: 2011-07-10 02:35:13
            96CS355: Topics in cryptography  Spring 2014 Assignment #2 Due: Tuesday, June 3, 2014.

            CS355: Topics in cryptography Spring 2014 Assignment #2 Due: Tuesday, June 3, 2014.

            Add to Reading List

            Source URL: crypto.stanford.edu

            Language: English - Date: 2014-05-29 16:56:32
              97Post-quantum cryptography Daniel J. Bernstein1 Tanja Lange1  Peter Schwabe2

              Post-quantum cryptography Daniel J. Bernstein1 Tanja Lange1 Peter Schwabe2

              Add to Reading List

              Source URL: pqcrypto.eu.org

              Language: English - Date: 2016-09-13 19:59:32
                98Dartmouth College Computer Science Technical Report  TR2002The Future of Cryptography Under Quantum Computers

                Dartmouth College Computer Science Technical Report TR2002The Future of Cryptography Under Quantum Computers

                Add to Reading List

                Source URL: www.cs.dartmouth.edu

                Language: English
                99Cryptography Lecture 0 Manoj Prabhakaran University of Illinois Urbana-Champaign

                Cryptography Lecture 0 Manoj Prabhakaran University of Illinois Urbana-Champaign

                Add to Reading List

                Source URL: courses.engr.illinois.edu

                Language: English - Date: 2016-01-19 12:43:28