Cryptography

Results: 21893



#Item
151

Introduction to cryptography Christophe Ritzenthaler November 19, 2007 1

Add to Reading List

Source URL: perso.univ-rennes1.fr

Language: English - Date: 2013-10-08 10:44:32
    152

    Post-quantum cryptography Tanja Lange slides jointly with Daniel J. Bernstein Technische Universiteit Eindhoven 17 September 2017

    Add to Reading List

    Source URL: hyperelliptic.org

    Language: English - Date: 2017-10-22 12:24:16
      153

      Published in Designs, Codes and Cryptography 14(1):53–56, Reducing the elliptic curve cryptosystem of Meyer-M¨ uller to the cryptosystem of Rabin-Williams

      Add to Reading List

      Source URL: joye.site88.net

      Language: English - Date: 2015-09-04 19:43:59
        154

        This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

        Add to Reading List

        Source URL: cacr.uwaterloo.ca

        Language: English - Date: 2011-07-10 02:35:13
          155

          Financial Cryptography 2010 Group To: Montserrat Wehbe Groups Coordinator. Viajes Best Travel S.L. Calle Bencomo, San Cristobal de La Laguna, Tenerife. SPAIN E-mail:

          Add to Reading List

          Source URL: fc10.ifca.ai

          Language: English - Date: 2009-12-18 13:12:21
            156

            Bypassing HTTP Strict Transport Security Jose Selvi Abstract—For the last few years, some different attacks against SSL/TLS have been released. Some of them based on cryptography or protocol weaknes

            Add to Reading List

            Source URL: www.blackhat.com

            Language: English - Date: 2015-05-28 15:50:56
              157

              Lightweight Cryptography on ARM Software implementation of block ciphers and ECC Rafael Cruz, Tiago Reis, Diego F. Aranha, Julio López, Harsh Kupwade Patil University of Campinas, LG Electronics Inc.

              Add to Reading List

              Source URL: ccccspeed.win.tue.nl

              Language: English - Date: 2016-10-23 17:33:58
                158

                Cryptography module, AnswersInitially, we have L0 = 86, R0 = 83, K0 = 89. Then we run the first round, to obtain L1 = 83, R1 = 2. Also, K1 = 164. So, computing the next round, we have L2 = 9 and R2 = 2. So the out

                Add to Reading List

                Source URL: www.cs.bham.ac.uk

                Language: English - Date: 2017-11-13 11:53:55
                  159

                  ACNS ’15 13th International Conference on Applied Cryptography and Network Security 2–5 June 2015, New York Columbia University

                  Add to Reading List

                  Source URL: acns2015.cs.columbia.edu

                  Language: English - Date: 2014-10-31 17:51:16
                    160

                    Cryptography Working Group

                    Add to Reading List

                    Source URL: www.win.tue.nl

                    - Date: 2012-06-06 09:22:12
                      UPDATE