Cryptology

Results: 302



#Item
111

TSpecial Course on Cryptology Seminar V: Private Set Intesection Protocols Sven Laur Helsinki University of Technology

Add to Reading List

Source URL: lepo.it.da.ut.ee

Language: English - Date: 2004-04-06 04:00:16
    112

    Masking Based Domain Extenders for UOWHFs: Bounds and Constructions Palash Sarkar Cryptology Research Group Applied Statistics Unit Indian Statistical Institute

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2007-09-06 02:11:54
      113

      Supplemental Readings CMSC-443 Cryptology, Alan T. Sherman, Spring 2011, UMBC Anderson, Ross, Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley (2008), second edition. ISBN6

      Add to Reading List

      Source URL: www.cisa.umbc.edu

      Language: English - Date: 2012-01-12 23:51:11
        114

        Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves Pradeep Kumar Mishra and Palash Sarkar Cryptology Research Group, Applied Statistics Unit, Indian Statistical Institute,

        Add to Reading List

        Source URL: www.iacr.org

        Language: English - Date: 2007-09-01 21:55:01
          115

          Crypto 2015 Call for Papers Original contributions on all technical aspects of cryptology are solicited for submission to Crypto 2015, the 35th Annual International Cryptology Conference. Submissions are welcome on any c

          Add to Reading List

          Source URL: www.iacr.org

          Language: English - Date: 2014-12-09 14:03:11
            116

            Syllabus CMSC-443 Cryptology, Alan T. Sherman, Spring 2011, UMBC Instructor Dr. Alan T. Sherman, Ph.D. Associate Professor, Computer Science Department of Computer Science and Electrical Engineering (CSEE)

            Add to Reading List

            Source URL: www.cisa.umbc.edu

            Language: English - Date: 2012-01-12 23:51:12
              117

              Efficient Doubling on Genus Two Curves over Binary Fields Tanja Lange1, and Marc Stevens2, 1 Institute for Information Security and Cryptology (ITSC), Ruhr-Universit¨

              Add to Reading List

              Source URL: marc-stevens.nl

              Language: English - Date: 2009-06-17 12:34:52
                118

                True Random Number Generation: A Standard(s) Dilemma Paul Timmel Cryptology Office Information Assurance Research Group

                Add to Reading List

                Source URL: www.chesworkshop.org

                Language: English - Date: 2008-01-10 16:51:15
                  119Oblivious transfer / Asiacrypt / International Cryptology Conference / Algorithmic Number Theory Symposium / Cryptography / Proxy re-encryption / Lecture Notes in Computer Science

                  Matthew D. Green Curriculum Vitae Contact 3400 N. Charles Street, 209 Maryland Hall, Baltimore, MDPhone: Fax:

                  Add to Reading List

                  Source URL: spar.isi.jhu.edu

                  Language: English - Date: 2013-09-11 11:45:30
                  120

                  Scrambled Messages ~ 1 Cryptology It is not always necessary to use a code or cipher to hide the meaning of a message. It can also be done just by using some re-arrangement of the message without changing any of the

                  Add to Reading List

                  Source URL: www.cleavebooks.co.uk

                  - Date: 2007-05-13 18:30:16
                    UPDATE