Cryptography

Results: 21893



#Item
71

Fundamentals of Modern Cryptography

Add to Reading List

Source URL: momjian.us

Language: English - Date: 2018-08-11 09:26:22
    72

    A gentle introduction to elliptic curve cryptography Craig Costello Tutorial at SPACE 2016 December 15, 2016 CRRao AIMSCS, Hyderabad, India

    Add to Reading List

    Source URL: www.craigcostello.com.au

    Language: English - Date: 2016-12-16 02:30:21
      73

      Cryptography Working Group

      Add to Reading List

      Source URL: www.win.tue.nl

      Language: English - Date: 2015-12-06 07:38:15
        74

        Attacking Elliptic-Curve Cryptography Ruben Niederhagen April 15, 2010 Why cryptography?

        Add to Reading List

        Source URL: www.polycephaly.org

        Language: English - Date: 2010-04-19 10:03:17
          75

          TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptography 1, Friday 29 January 2010 Name

          Add to Reading List

          Source URL: www.hyperelliptic.org

          Language: English - Date: 2010-06-11 09:06:39
            76

            Cryptography Working Group

            Add to Reading List

            Source URL: www.win.tue.nl

            - Date: 2017-03-18 07:09:23
              77

              Hash-based Signatures in Practice Starting the transition to post-quantum cryptography Stefan-Lukas Gazdag PQCrypto –

              Add to Reading List

              Source URL: 2017.pqcrypto.org

              Language: English - Date: 2017-06-27 05:20:35
                78

                This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

                Add to Reading List

                Source URL: cacr.uwaterloo.ca

                Language: English - Date: 2011-07-10 02:35:13
                  79

                  BLOCKCHAIN: BITCOIN WALLET CRYPTOGRAPHY SECURITY, CHALLENGES AND COUNTERMEASURES

                  Add to Reading List

                  Source URL: www.icommercecentral.com

                  Language: English - Date: 2018-01-02 01:56:27
                    80

                    This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

                    Add to Reading List

                    Source URL: cacr.uwaterloo.ca

                    Language: English - Date: 2011-07-10 02:35:13
                      UPDATE