Cryptography

Results: 21893



#Item
221

Isogenies in cryptography F. Morain Laboratoire d’Informatique de l’École polytechnique University of Waterloo, June 17, 2009

Add to Reading List

Source URL: www.lix.polytechnique.fr

- Date: 2009-06-18 18:43:10
    222

    Lattice-Based Cryptography in Java Advisor(s): Christian Hanser and Sebastian Ramacher Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

    Add to Reading List

    Source URL: www.iaik.tugraz.at

    - Date: 2015-09-08 06:00:03
      223

      A Retrospective on the Use of Export Cryptography or, Top 10 Ways Bill Clinton Broke TLS! David Adrian

      Add to Reading List

      Source URL: davidadrian.org

      - Date: 2016-08-05 23:56:59
        224

        Cryptography M. Edwards Introduction Transposition Substitution

        Add to Reading List

        Source URL: xn--bta-yla.net

        - Date: 2014-12-31 11:24:35
          225

          Full-field implementation of a perfect eavesdropper on a quantum cryptography system arXiv:1011.0105v2 [quant-ph] 18 MarIlja Gerhardt,1, 2 Qin Liu,1, 3 Ant´ıa Lamas-Linares,2 Johannes Skaar,3, 4 Christian Kurtsi

          Add to Reading List

          Source URL: arxiv.org

          - Date: 2012-03-19 20:23:48
            226

            FIRST ANNUAL CONFERENCE ON QUANTUM CRYPTOGRAPHY www.qcrypt.net ETH Zurich

            Add to Reading List

            Source URL: www.qcrypt2011.ethz.ch

            - Date: 2011-04-27 08:27:29
              227

              Constructing Cryptographic Definitions Phillip Rogaway∗ March 11, 2012 one that, I suspect, is quite popular among those who work on the more rigorous side of cryptography. This alternative viewpoint is what might be c

              Add to Reading List

              Source URL: web.cs.ucdavis.edu

              - Date: 2012-03-11 15:42:50
                228

                Designs, Codes and Cryptography, 19, 101–c 2000 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. ° Integer Factoring

                Add to Reading List

                Source URL: www.mat.uniroma2.it

                - Date: 2007-10-06 07:47:23
                  229

                  INTERNALIZED COLONIAL THINKING AND GENDER DISCRIMINATION by Neal Koblitz Last December I went to Hyderabad for an international conference on cryptography. It was well organized and successful; however, I was disappointe

                  Add to Reading List

                  Source URL: kovfund.org

                  - Date: 2011-08-18 21:24:52
                    230

                    Information Security and Cryptography Fundamentals and Applications June 12-14, 2017 Zurich, Switzerland

                    Add to Reading List

                    Source URL: www.infsec.ch

                    - Date: 2016-07-05 03:59:38
                      UPDATE