Cryptography Research

Results: 540



#Item
1Why Johnny the Developer Can’t Work with Public Key Certificates? An Experimental Study of OpenSSL Usability Martin Ukrop[0000−0001−8110−8926] and Vashek Matyas Centre for Research on Cryptography and Security Fa

Why Johnny the Developer Can’t Work with Public Key Certificates? An Experimental Study of OpenSSL Usability Martin Ukrop[0000−0001−8110−8926] and Vashek Matyas Centre for Research on Cryptography and Security Fa

Add to Reading List

Source URL: crocs.fi.muni.cz

Language: English - Date: 2018-04-25 10:30:18
    2a Cimpa-ICTP research school on Lattices and application to cryptography and coding theory Saigon University, Ho Chi Minh City, August 1st-12th 2016 International Participants 1 Ankur

    a Cimpa-ICTP research school on Lattices and application to cryptography and coding theory Saigon University, Ho Chi Minh City, August 1st-12th 2016 International Participants 1 Ankur

    Add to Reading List

    Source URL: ricerca.mat.uniroma3.it

    Language: English - Date: 2016-08-27 09:19:02
      3Financial Cryptography and Data Security February 28 – March 4, 2011, Bay Gardens Beach Resort, St. Lucia http://ifca.ai/fc11/ Financial Cryptography and Data Security is a major international forum for research, advan

      Financial Cryptography and Data Security February 28 – March 4, 2011, Bay Gardens Beach Resort, St. Lucia http://ifca.ai/fc11/ Financial Cryptography and Data Security is a major international forum for research, advan

      Add to Reading List

      Source URL: fc11.ifca.ai

      Language: English - Date: 2010-09-28 04:53:23
        4Standards for Efficient Cryptography  SEC 1: Elliptic Curve Cryptography Certicom Research Contact: Daniel R. L. Brown () May 21, 2009

        Standards for Efficient Cryptography SEC 1: Elliptic Curve Cryptography Certicom Research Contact: Daniel R. L. Brown () May 21, 2009

        Add to Reading List

        Source URL: www.secg.org

        Language: English - Date: 2015-01-29 09:45:12
          5Financial Cryptography and Data Security April 1 – 5, 2013, Busena Terrace Beach Resort, Okinawa, Japan http://fc13.ifca.ai/ Financial Cryptography and Data Security is a major international forum for research, advance

          Financial Cryptography and Data Security April 1 – 5, 2013, Busena Terrace Beach Resort, Okinawa, Japan http://fc13.ifca.ai/ Financial Cryptography and Data Security is a major international forum for research, advance

          Add to Reading List

          Source URL: fc13.ifca.ai

          Language: English - Date: 2012-12-24 18:49:52
            6S TANDARDS FOR E FFICIENT C RYPTOGRAPHY  SEC 1: Elliptic Curve Cryptography Certicom Research Contact:

            S TANDARDS FOR E FFICIENT C RYPTOGRAPHY SEC 1: Elliptic Curve Cryptography Certicom Research Contact:

            Add to Reading List

            Source URL: www.secg.org

            Language: English - Date: 2015-01-29 09:45:12
              7Colleen M. Swanson travellingcryptographer.com •  Research Interests Computer security and applied cryptography, privacy-enhancing technologies, security/privacy-related public policy, i

              Colleen M. Swanson travellingcryptographer.com • Research Interests Computer security and applied cryptography, privacy-enhancing technologies, security/privacy-related public policy, i

              Add to Reading List

              Source URL: travellingcryptographer.com

              - Date: 2017-10-03 15:50:40
                8Bitcoin Private  March 16, 2018 The Bitcoin Private foundation is awarding a series of grants of up to $150,000 for research in areas of cryptography and network security that further our goals of enhancing and democrat

                Bitcoin Private  March 16, 2018 The Bitcoin Private foundation is awarding a series of grants of up to $150,000 for research in areas of cryptography and network security that further our goals of enhancing and democrat

                Add to Reading List

                Source URL: btcprivate.org

                - Date: 2018-04-03 14:16:22
                  9On a generalized Gross-Zagier formula and applications to genus 2 curves in cryptography Kristin Lauter, Microsoft Research Joint work with: Bianca Viray, Brown University

                  On a generalized Gross-Zagier formula and applications to genus 2 curves in cryptography Kristin Lauter, Microsoft Research Joint work with: Bianca Viray, Brown University

                  Add to Reading List

                  Source URL: www.cosic.esat.kuleuven.be

                  - Date: 2013-09-19 10:39:02