Cryptography

Results: 21893



#Item
111

Lehrstuhl f¨ur Theoretische Informationstechnik Homework 5 in Cryptography I Prof. Dr. Rudolf Mathar, Wolfgang Meyer zu Bergsten, Michael Reyer

Add to Reading List

Source URL: www.ti.rwth-aachen.de

- Date: 2008-11-24 01:25:56
    112

    Standards for Efficient Cryptography SEC 1: Elliptic Curve Cryptography Certicom Research Contact: Daniel R. L. Brown () May 21, 2009

    Add to Reading List

    Source URL: www.secg.org

    Language: English - Date: 2015-01-29 09:45:12
      113

      Quantum computers and factoring Learning with errors Cryptography from LWE From linear algebra to post-quantum cryptography

      Add to Reading List

      Source URL: pqcrypto.eu.org

      Language: English - Date: 2016-11-21 18:19:16
        114

        Published in Designs, Codes and Cryptography, 77(2):441–477, Linearly Homomorphic Structure-Preserving Signatures and Their Applications Benoˆıt Libert · Thomas Peters · Marc Joye · Moti Yung

        Add to Reading List

        Source URL: joye.site88.net

        Language: English - Date: 2015-10-02 18:24:31
          115

          Published in D. Naccache, Ed., Cryptography and Security: From Theory to Applications (Quisquater Festschrift), volof Lecture Notes in Computer Science, pp. 3-7, Springer, 2012. On Quisquater’s Multiplication Al

          Add to Reading List

          Source URL: joye.site88.net

          Language: English - Date: 2015-09-04 19:43:51
            116

            The Brave New World of Bodacious Assumptions in Cryptography Neal Koblitz and Alfred Menezes T

            Add to Reading List

            Source URL: www.ams.org

            Language: English - Date: 2010-02-10 08:51:31
              117

              2010 23rd IEEE Computer Security Foundations Symposium Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks Boris K¨opf MPI-SWS

              Add to Reading List

              Source URL: users.cis.fiu.edu

              Language: English - Date: 2014-09-02 15:19:21
                118

                Tail bounds and applications in Cryptography Giorgos Panagiotakos Introduction to Modern Cryptography Course Organizer: Prof. Aggelos Kiayias October 26, 2016

                Add to Reading List

                Source URL: www.kiayias.com

                Language: English - Date: 2016-11-15 15:31:31
                  119

                  TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptography 1, Monday 11 April 2011 Name

                  Add to Reading List

                  Source URL: www.hyperelliptic.org

                  Language: English - Date: 2011-09-06 00:59:21
                    120

                    Cryptography Working Group

                    Add to Reading List

                    Source URL: www.win.tue.nl

                    - Date: 2015-02-21 08:14:30
                      UPDATE