Cryptography

Results: 21893



#Item
41TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptography 1, Friday 21 January 2011 Name

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptography 1, Friday 21 January 2011 Name

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2011-01-25 10:37:58
    42Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors Patrick Longa, and Catherine Gebotys Department of Electrical and Computer Engineering, University of Waterloo, Canada, {pl

    Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors Patrick Longa, and Catherine Gebotys Department of Electrical and Computer Engineering, University of Waterloo, Canada, {pl

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2010-06-09 13:30:54
      43Introduction to Modern Cryptography: Revision1 Giorgos Panagiotakos Course Organizer: Prof. Aggelos Kiayias May 18, 2018

      Introduction to Modern Cryptography: Revision1 Giorgos Panagiotakos Course Organizer: Prof. Aggelos Kiayias May 18, 2018

      Add to Reading List

      Source URL: www.inf.ed.ac.uk

      Language: English - Date: 2018-05-18 17:42:25
        44Lehrstuhl f¨ur Theoretische Informationstechnik  Homework 10 in Cryptography I Prof. Dr. Rudolf Mathar, Wolfgang Meyer zu Bergsten, Michael Reyer

        Lehrstuhl f¨ur Theoretische Informationstechnik Homework 10 in Cryptography I Prof. Dr. Rudolf Mathar, Wolfgang Meyer zu Bergsten, Michael Reyer

        Add to Reading List

        Source URL: www.ti.rwth-aachen.de

        Language: English - Date: 2009-01-13 05:07:23
          45Farfalle and Kravatte Parallel permutation-based cryptography Guido Bertoni1 Joan Daemen1,2 Michaël Peeters1 Gilles Van Assche1 Ronny Van Keer1 1 STMicroelectronics

          Farfalle and Kravatte Parallel permutation-based cryptography Guido Bertoni1 Joan Daemen1,2 Michaël Peeters1 Gilles Van Assche1 Ronny Van Keer1 1 STMicroelectronics

          Add to Reading List

          Source URL: www.cryptolux.org

          Language: English - Date: 2017-01-18 08:26:40
            46Cryptography module, Exercises 2 (unassessed)  You can’t get credit for these exercises, but you can still submit them on Canvas and you will get feedback. You must type your answers in a word processing system, and cr

            Cryptography module, Exercises 2 (unassessed) You can’t get credit for these exercises, but you can still submit them on Canvas and you will get feedback. You must type your answers in a word processing system, and cr

            Add to Reading List

            Source URL: www.cs.bham.ac.uk.

            Language: English - Date: 2017-10-24 13:35:44
              47Elliptic Curves over Q Peter Birkner Technische Universiteit Eindhoven DIAMANT Summer School on Elliptic and Hyperelliptic Curve Cryptography

              Elliptic Curves over Q Peter Birkner Technische Universiteit Eindhoven DIAMANT Summer School on Elliptic and Hyperelliptic Curve Cryptography

              Add to Reading List

              Source URL: www.pbirkner.fastmail.fm

              Language: English - Date: 2008-09-19 03:32:03
                48CSCI 5440: Cryptography The Chinese University of Hong Kong, Spring 2018 Lecture 12 9 and 10 April 2018

                CSCI 5440: Cryptography The Chinese University of Hong Kong, Spring 2018 Lecture 12 9 and 10 April 2018

                Add to Reading List

                Source URL: www.cse.cuhk.edu.hk

                Language: English - Date: 2018-04-09 09:00:18
                  49Fast Cryptography in Genus 2  Joppe W. Bos, Craig Costello, Huseyin Hisil and Kristin Lauter EUROCRYPT 2013 Athens, Greece

                  Fast Cryptography in Genus 2 Joppe W. Bos, Craig Costello, Huseyin Hisil and Kristin Lauter EUROCRYPT 2013 Athens, Greece

                  Add to Reading List

                  Source URL: www.craigcostello.com.au

                  Language: English - Date: 2013-05-28 04:43:53
                    50Correspondences Regarding Cryptography between John Nash and the NSA∗ February 20, 2012 Abstract In 1955, well-known mathematician John Nash was in correspondence

                    Correspondences Regarding Cryptography between John Nash and the NSA∗ February 20, 2012 Abstract In 1955, well-known mathematician John Nash was in correspondence

                    Add to Reading List

                    Source URL: web.engr.oregonstate.edu

                    Language: English - Date: 2012-02-22 13:07:33