Cryptography

Results: 21893



#Item
131

a Course in Cryptography rafael pass abhi shelat

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2010-08-26 11:46:13
    132

    CS255: Cryptography and Computer Security Winter 2010 Final Exam Instructions

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2010-03-21 15:11:32
      133

      This is the Table of Contents of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC PressCRC Press has granted the following specific permi

      Add to Reading List

      Source URL: hyperelliptic.org

      Language: English - Date: 2006-09-06 22:21:24
        134Cryptography / Emerging technologies / Quantum computing / Quantum cryptography / Applied mathematics / Theoretical computer science / Daniel J. Bernstein / Post-quantum cryptography / Alice and Bob / Cryptanalysis

        Eighth International Conference on Post-Quantum Cryptography PQCrypto 2017 Utrecht, The Netherlands, June 2628, 2017 https://2017.pqcrypto.org

        Add to Reading List

        Source URL: 2017.pqcrypto.org

        Language: English - Date: 2017-01-12 18:50:43
        135

        Budapest University of Technology and Economics Faculty of Electrical Engineering and Informatics Department of Telecommunications Laboratory of Cryptography and System Security (CrySyS Lab.) Szurdi János

        Add to Reading List

        Source URL: janos.szurdi.com

        Language: Hungarian - Date: 2017-11-10 15:47:05
          136

          20 years of isogeny-based cryptography Luca De Feo feat. Jean Kieffer, Benjamin Smith Université Paris Saclay, UVSQ & Inria November 14, 2017, Elliptic Curve Cryptography, Nijmegen

          Add to Reading List

          Source URL: defeo.lu

          Language: English - Date: 2018-05-31 20:20:22
            137

            Cryptography from Sunspots: How to Use an Imperfect Reference String Ran Canetti∗† IBM Rafael Pass‡†

            Add to Reading List

            Source URL: people.csail.mit.edu

            Language: English - Date: 2007-12-16 00:26:33
              138

              Leakage Resilient Cryptography: (a Practical Overview) F.-X. Standaert UCL Crypto Group, Universit´ e catholique de Louvain

              Add to Reading List

              Source URL: skew2011.mat.dtu.dk

              Language: English - Date: 2011-02-16 06:19:32
                139

                Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process Table of Contents 1. Background 2. Requirements for Submission Packages 2.A Cover Sheet


                Add to Reading List

                Source URL: csrc.nist.gov

                Language: English - Date: 2017-02-01 14:36:46
                  140

                  322 Int. J. Applied Cryptography, Vol. 2, No. 4, 2012 Chosen-prefix collisions for MD5 and applications Marc Stevens*

                  Add to Reading List

                  Source URL: documents.epfl.ch

                  Language: English - Date: 2012-08-03 05:02:16
                    UPDATE