Cryptography

Results: 21893



#Item
31EIDMA/DIAMANT Cryptography Working Group _______________________________________________________________ Friday February 2, 2007 Universiteit van Amsterdam Roeterseilandcomplex, zaal D028 See the EIDMA website for a rout

EIDMA/DIAMANT Cryptography Working Group _______________________________________________________________ Friday February 2, 2007 Universiteit van Amsterdam Roeterseilandcomplex, zaal D028 See the EIDMA website for a rout

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2011-04-06 03:05:16
    32Call for Sponsors  FDTC’s Motivation and Scope FDTC is the annual workshop focusing on Fault Diagnosis and Tolerance in Cryptography. In recent years applied cryptography has developed considerably to satisfy the incre

    Call for Sponsors FDTC’s Motivation and Scope FDTC is the annual workshop focusing on Fault Diagnosis and Tolerance in Cryptography. In recent years applied cryptography has developed considerably to satisfy the incre

    Add to Reading List

    Source URL: conferenze.dei.polimi.it

    Language: English - Date: 2018-03-15 12:46:57
      33Why Johnny the Developer Can’t Work with Public Key Certificates? An Experimental Study of OpenSSL Usability Martin Ukrop[0000−0001−8110−8926] and Vashek Matyas Centre for Research on Cryptography and Security Fa

      Why Johnny the Developer Can’t Work with Public Key Certificates? An Experimental Study of OpenSSL Usability Martin Ukrop[0000−0001−8110−8926] and Vashek Matyas Centre for Research on Cryptography and Security Fa

      Add to Reading List

      Source URL: crocs.fi.muni.cz

      Language: English - Date: 2018-04-25 10:30:18
        34Post-quantum cryptography for long-term security PQCRYPTO ICTDaniel J. Bernstein and Tanja LangeApril 2016

        Post-quantum cryptography for long-term security PQCRYPTO ICTDaniel J. Bernstein and Tanja LangeApril 2016

        Add to Reading List

        Source URL: pqcrypto.eu.org

        Language: English - Date: 2016-05-08 11:02:35
          35Post-quantum cryptography for long-term security PQCRYPTO ICTPQCrypto Review Meeting / Workshop, Utrecht, the Netherlands, June 28, 2016 Optimizing Post-Quantum Cryptographic Algorithms for Modern and Future Proc

          Post-quantum cryptography for long-term security PQCRYPTO ICTPQCrypto Review Meeting / Workshop, Utrecht, the Netherlands, June 28, 2016 Optimizing Post-Quantum Cryptographic Algorithms for Modern and Future Proc

          Add to Reading List

          Source URL: pqcrypto.eu.org

          Language: English - Date: 2016-06-29 18:47:49
            36Code-based Cryptography — PQCRYPTO Summer School on Post-Quantum Cryptography 2017 TU Eindhoven  —

            Code-based Cryptography — PQCRYPTO Summer School on Post-Quantum Cryptography 2017 TU Eindhoven —

            Add to Reading List

            Source URL: 2017.pqcrypto.org

            Language: English - Date: 2017-06-20 16:19:56
              37Ehsan Toreini  Skills PhD Student in Cryptography and Security, Newcastle upon Tyne,

              Ehsan Toreini Skills PhD Student in Cryptography and Security, Newcastle upon Tyne,

              Add to Reading List

              Source URL: toreini.github.io

              Language: English - Date: 2018-07-15 19:31:38
              38QcBits: constant-time small-key code-based cryptography Tung Chou Technische Universiteit Eindhoven, The Netherlands  Coding theory

              QcBits: constant-time small-key code-based cryptography Tung Chou Technische Universiteit Eindhoven, The Netherlands Coding theory

              Add to Reading List

              Source URL: pqcrypto.eu.org

              Language: English - Date: 2016-06-30 13:40:24
                39Time-Lapse Cryptography Michael O. Rabin and Christopher Thorpe TR-22-06

                Time-Lapse Cryptography Michael O. Rabin and Christopher Thorpe TR-22-06

                Add to Reading List

                Source URL: ftp.deas.harvard.edu

                Language: English - Date: 2007-01-04 11:14:02
                  40Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks Boris K¨opf MPI-SWS

                  Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks Boris K¨opf MPI-SWS

                  Add to Reading List

                  Source URL: software.imdea.org

                  Language: English - Date: 2010-09-02 11:11:48