Cryptography

Results: 21893



#Item
71Fundamentals of Modern Cryptography

Fundamentals of Modern Cryptography

Add to Reading List

Source URL: momjian.us

Language: English - Date: 2018-08-11 09:26:22
    72A gentle introduction to elliptic curve cryptography Craig Costello Tutorial at SPACE 2016 December 15, 2016 CRRao AIMSCS, Hyderabad, India

    A gentle introduction to elliptic curve cryptography Craig Costello Tutorial at SPACE 2016 December 15, 2016 CRRao AIMSCS, Hyderabad, India

    Add to Reading List

    Source URL: www.craigcostello.com.au

    Language: English - Date: 2016-12-16 02:30:21
      73Cryptography Working Group

      Cryptography Working Group

      Add to Reading List

      Source URL: www.win.tue.nl

      Language: English - Date: 2015-12-06 07:38:15
        74Attacking Elliptic-Curve Cryptography Ruben Niederhagen April 15, 2010  Why cryptography?

        Attacking Elliptic-Curve Cryptography Ruben Niederhagen April 15, 2010 Why cryptography?

        Add to Reading List

        Source URL: www.polycephaly.org

        Language: English - Date: 2010-04-19 10:03:17
          75TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptography 1, Friday 29 January 2010 Name

          TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptography 1, Friday 29 January 2010 Name

          Add to Reading List

          Source URL: www.hyperelliptic.org

          Language: English - Date: 2010-06-11 09:06:39
            76Cryptography Working Group

            Cryptography Working Group

            Add to Reading List

            Source URL: www.win.tue.nl

            - Date: 2017-03-18 07:09:23
              77Hash-based Signatures in Practice Starting the transition to post-quantum cryptography Stefan-Lukas Gazdag PQCrypto –

              Hash-based Signatures in Practice Starting the transition to post-quantum cryptography Stefan-Lukas Gazdag PQCrypto –

              Add to Reading List

              Source URL: 2017.pqcrypto.org

              Language: English - Date: 2017-06-27 05:20:35
                78This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

                This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

                Add to Reading List

                Source URL: cacr.uwaterloo.ca

                Language: English - Date: 2011-07-10 02:35:13
                  79BLOCKCHAIN: BITCOIN WALLET CRYPTOGRAPHY SECURITY, CHALLENGES AND COUNTERMEASURES

                  BLOCKCHAIN: BITCOIN WALLET CRYPTOGRAPHY SECURITY, CHALLENGES AND COUNTERMEASURES

                  Add to Reading List

                  Source URL: www.icommercecentral.com

                  Language: English - Date: 2018-01-02 01:56:27
                    80This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

                    This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

                    Add to Reading List

                    Source URL: cacr.uwaterloo.ca

                    Language: English - Date: 2011-07-10 02:35:13