Cryptography

Results: 21893



#Item
81

ACNS’08 6th International Conference on Applied Cryptography and Network Security 3~6 June 2008, N. York

Add to Reading List

Source URL: acns2008.cs.columbia.edu

Language: English - Date: 2008-04-22 13:49:58
    82Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina  August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

    Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

    Add to Reading List

    Source URL: www.cryptme.in

    Language: English - Date: 2018-07-09 04:03:14
      83Cryptography Working Group

      Cryptography Working Group

      Add to Reading List

      Source URL: www.win.tue.nl

      Language: English - Date: 2013-06-11 02:58:34
        84CSCI 5440: Cryptography The Chinese University of Hong Kong, Spring 2018 Lecture 5 5 and 6 February 2018

        CSCI 5440: Cryptography The Chinese University of Hong Kong, Spring 2018 Lecture 5 5 and 6 February 2018

        Add to Reading List

        Source URL: www.cse.cuhk.edu.hk

        Language: English - Date: 2018-03-23 01:36:01
          85Code based cryptography J.-P. Tillich March 24, 2015 introduction

          Code based cryptography J.-P. Tillich March 24, 2015 introduction

          Add to Reading List

          Source URL: www.pcqc.fr

          Language: English - Date: 2015-03-25 23:20:36
            86Post-quantum cryptography  Peter Schwabe  https://cryptojedi.org March 22, 2017

            Post-quantum cryptography Peter Schwabe https://cryptojedi.org March 22, 2017

            Add to Reading List

            Source URL: cryptojedi.org

            Language: English - Date: 2017-03-23 09:39:16
              87An introduction to supersingular isogeny-based cryptography Craig Costello November 10 ECC 2017

              An introduction to supersingular isogeny-based cryptography Craig Costello November 10 ECC 2017

              Add to Reading List

              Source URL: www.craigcostello.com.au

              Language: English - Date: 2017-11-10 07:41:16
                88An introduction to supersingular isogeny-based cryptography Craig Costello Summer School on Real-World Crypto and Privacy June 8, 2017

                An introduction to supersingular isogeny-based cryptography Craig Costello Summer School on Real-World Crypto and Privacy June 8, 2017

                Add to Reading List

                Source URL: www.craigcostello.com.au

                Language: English - Date: 2017-06-10 05:08:02
                  89Cryptographic Hash Functions Part II Cryptography 1 Andreas Hülsing, TU/e Some slides by Sebastiaan de Hoogh, TU/e

                  Cryptographic Hash Functions Part II Cryptography 1 Andreas Hülsing, TU/e Some slides by Sebastiaan de Hoogh, TU/e

                  Add to Reading List

                  Source URL: www.hyperelliptic.org

                  Language: English - Date: 2016-09-29 20:50:51
                    90CSCI 5440: Cryptography The Chinese University of Hong Kong, Spring 2018 Lecture 7 26 and 27 February 2018

                    CSCI 5440: Cryptography The Chinese University of Hong Kong, Spring 2018 Lecture 7 26 and 27 February 2018

                    Add to Reading List

                    Source URL: www.cse.cuhk.edu.hk

                    Language: English - Date: 2018-02-26 09:56:01