Cryptography

Results: 21893



#Item
51CSCI 5440: Cryptography The Chinese University of Hong Kong, SpringLecture 4

CSCI 5440: Cryptography The Chinese University of Hong Kong, SpringLecture 4

Add to Reading List

Source URL: www.cse.cuhk.edu.hk

Language: English - Date: 2018-03-06 02:49:38
    52Lehrstuhl f¨ur Theoretische Informationstechnik  Homework 11 in Cryptography I Prof. Dr. Rudolf Mathar, Wolfgang Meyer zu Bergsten, Michael Reyer

    Lehrstuhl f¨ur Theoretische Informationstechnik Homework 11 in Cryptography I Prof. Dr. Rudolf Mathar, Wolfgang Meyer zu Bergsten, Michael Reyer

    Add to Reading List

    Source URL: www.ti.rwth-aachen.de

    Language: English - Date: 2009-01-21 01:44:04
      53Lehrstuhl f¨ur Theoretische Informationstechnik  Homework 12 in Cryptography I Prof. Dr. Rudolf Mathar, Wolfgang Meyer zu Bergsten, Michael Reyer

      Lehrstuhl f¨ur Theoretische Informationstechnik Homework 12 in Cryptography I Prof. Dr. Rudolf Mathar, Wolfgang Meyer zu Bergsten, Michael Reyer

      Add to Reading List

      Source URL: www.ti.rwth-aachen.de

      Language: English - Date: 2009-02-12 07:23:51
        54EIDMA/DIAMANT Cryptography Working Group _______________________________________________________________ Friday, October 1, 2010 Trianon Zalencentrum ( http://www.trianon-zalen.nl/ ) Oudegracht 252, Utrecht

        EIDMA/DIAMANT Cryptography Working Group _______________________________________________________________ Friday, October 1, 2010 Trianon Zalencentrum ( http://www.trianon-zalen.nl/ ) Oudegracht 252, Utrecht

        Add to Reading List

        Source URL: www.win.tue.nl

        - Date: 2011-04-06 03:04:08
          55Class Group Computations Application to Cryptography Class Group Computations in Number Fields and Applications to Cryptography Alexandre Gélin

          Class Group Computations Application to Cryptography Class Group Computations in Number Fields and Applications to Cryptography Alexandre Gélin

          Add to Reading List

          Source URL: jc2-2017.inria.fr

          Language: English - Date: 2017-05-09 09:15:37
            56Crafting Certified Elliptic Curve Cryptography Implementations in Coq Andres Erbsen Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree o

            Crafting Certified Elliptic Curve Cryptography Implementations in Coq Andres Erbsen Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree o

            Add to Reading List

            Source URL: adam.chlipala.net

            Language: English - Date: 2018-02-11 06:46:49
              57Public-key cryptography in Tor and pluggable transports Tanja Lange Technische Universiteit Eindhoven  09 June 2016

              Public-key cryptography in Tor and pluggable transports Tanja Lange Technische Universiteit Eindhoven 09 June 2016

              Add to Reading List

              Source URL: hyperelliptic.org

              Language: English - Date: 2016-08-28 19:31:14
                58Workshop on Real-World Cryptography Stanford University Jan. 9-11, 2013 AES-GCM for Efficient Authenticated Encryption – Ending the Reign of HMAC-SHA-1? Shay Gueron

                Workshop on Real-World Cryptography Stanford University Jan. 9-11, 2013 AES-GCM for Efficient Authenticated Encryption – Ending the Reign of HMAC-SHA-1? Shay Gueron

                Add to Reading List

                Source URL: crypto.stanford.edu

                Language: English - Date: 2013-01-15 23:49:06
                  59Vectorial Boolean Functions for Cryptography Claude Carlet∗ This chapter is dedicated to the memory of Hans Dobbertin.  ∗

                  Vectorial Boolean Functions for Cryptography Claude Carlet∗ This chapter is dedicated to the memory of Hans Dobbertin. ∗

                  Add to Reading List

                  Source URL: www.math.univ-paris13.fr

                  Language: English - Date: 2012-10-31 08:46:12
                    60Cryptography Working Group

                    Cryptography Working Group

                    Add to Reading List

                    Source URL: www.win.tue.nl

                    - Date: 2012-11-27 07:26:58