Cryptography

Results: 21893



#Item
51

CSCI 5440: Cryptography The Chinese University of Hong Kong, SpringLecture 4

Add to Reading List

Source URL: www.cse.cuhk.edu.hk

Language: English - Date: 2018-03-06 02:49:38
    52

    Lehrstuhl f¨ur Theoretische Informationstechnik Homework 11 in Cryptography I Prof. Dr. Rudolf Mathar, Wolfgang Meyer zu Bergsten, Michael Reyer

    Add to Reading List

    Source URL: www.ti.rwth-aachen.de

    Language: English - Date: 2009-01-21 01:44:04
      53

      Lehrstuhl f¨ur Theoretische Informationstechnik Homework 12 in Cryptography I Prof. Dr. Rudolf Mathar, Wolfgang Meyer zu Bergsten, Michael Reyer

      Add to Reading List

      Source URL: www.ti.rwth-aachen.de

      Language: English - Date: 2009-02-12 07:23:51
        54

        EIDMA/DIAMANT Cryptography Working Group _______________________________________________________________ Friday, October 1, 2010 Trianon Zalencentrum ( http://www.trianon-zalen.nl/ ) Oudegracht 252, Utrecht

        Add to Reading List

        Source URL: www.win.tue.nl

        - Date: 2011-04-06 03:04:08
          55

          Class Group Computations Application to Cryptography Class Group Computations in Number Fields and Applications to Cryptography Alexandre Gélin

          Add to Reading List

          Source URL: jc2-2017.inria.fr

          Language: English - Date: 2017-05-09 09:15:37
            56

            Crafting Certified Elliptic Curve Cryptography Implementations in Coq Andres Erbsen Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree o

            Add to Reading List

            Source URL: adam.chlipala.net

            Language: English - Date: 2018-02-11 06:46:49
              57

              Public-key cryptography in Tor and pluggable transports Tanja Lange Technische Universiteit Eindhoven 09 June 2016

              Add to Reading List

              Source URL: hyperelliptic.org

              Language: English - Date: 2016-08-28 19:31:14
                58

                Workshop on Real-World Cryptography Stanford University Jan. 9-11, 2013 AES-GCM for Efficient Authenticated Encryption – Ending the Reign of HMAC-SHA-1? Shay Gueron

                Add to Reading List

                Source URL: crypto.stanford.edu

                Language: English - Date: 2013-01-15 23:49:06
                  59

                  Vectorial Boolean Functions for Cryptography Claude Carlet∗ This chapter is dedicated to the memory of Hans Dobbertin. ∗

                  Add to Reading List

                  Source URL: www.math.univ-paris13.fr

                  Language: English - Date: 2012-10-31 08:46:12
                    60

                    Cryptography Working Group

                    Add to Reading List

                    Source URL: www.win.tue.nl

                    - Date: 2012-11-27 07:26:58
                      UPDATE