Cryptology

Results: 302



#Item
101

Definitions and understanding of —information security --cryptology or cryptography --trusted computing --privacy -Xuejia Lai

Add to Reading List

Source URL: cis.sjtu.edu.cn

Language: English - Date: 2012-12-14 01:12:47
    102

    Call for papers ICISC 2004 The 7th Annual International Conference on Information Security and Cryptology December 2-3, 2004 Novotel Ambassador Gangnam, Seoul, Korea http://www.icisc.org/

    Add to Reading List

    Source URL: www.icisc.org

    Language: English - Date: 2016-01-16 13:27:08
      103Cryptography / International Cryptology Conference / Secure multi-party computation / RSA

      Crypto connections … and dividing a pie Rump Session of the Workshop on T&P of SMPC (May 08, 2014 – Aarhus, Denmark)

      Add to Reading List

      Source URL: cfem.au.dk

      Language: English - Date: 2015-08-24 07:02:25
      104

      ASIACRYPT 2012 The 18th Annual International Conference on the Theory and Application of Cryptology and Information Security December 2 - 6, 2012, Beijing, China Call for Papers

      Add to Reading List

      Source URL: cis.sjtu.edu.cn

      Language: English - Date: 2012-06-01 04:39:17
        105

        CANS 2006 The 5th International Conference on Cryptology

        Add to Reading List

        Source URL: cis.sjtu.edu.cn

        Language: English - Date: 2007-12-24 08:58:28
          106

          WEWoRC – Western European Workshop on Research in Cryptology, JulyWEWoRC is I a research meeting in the field of cryptology I with a specific focus on young researchers

          Add to Reading List

          Source URL: fse2007.uni.lu

          Language: English - Date: 2007-05-23 09:26:01
            107

            Output Privacy in Secure Multiparty Computation Emmanuel Bresson1 , Dario Catalano2 , Nelly Fazio3? , Antonio Nicolosi3? , and Moti Yung4?? 1 Cryptology Department, CELAR, France.

            Add to Reading List

            Source URL: www.cs.stevens.edu

            Language: English - Date: 2010-03-09 16:23:49
              108

              References [1] M. Abadi, E. Allender, A. Broder, J. Feigenbaum, and L. Hemachandra. On generating solved instances of computational problems. In S. Goldwasser, editor, Advances in Cryptology–CRYPTO ’88, volume 403 of

              Add to Reading List

              Source URL: www.credentica.com

              Language: English - Date: 2004-05-24 20:58:36
                109

                A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT ‘09, Lecture Notes in Computer Science Vol. 5479, pp. 371–388, A. Joux ed., Springer-Verlag, 2009. This is the full version. Salvagi

                Add to Reading List

                Source URL: web.cecs.pdx.edu

                Language: English - Date: 2009-09-29 10:06:27
                  110

                  REGISTRATION FORMThe 6th Int. Conference on Cryptology in Africa - EGYPT (AfricacryptParticipant: Mr or Ms Author or non-author:____________________________________ Student or non-student:________________

                  Add to Reading List

                  Source URL: egyptscience.net

                  Language: English - Date: 2013-04-15 04:01:31
                    UPDATE