Cryptology

Results: 302



#Item
11

Cryptology Fall 2017 Chloe Martindale TU/e September 28, 2017 These notes are based on notes by Tanja Lange and Ruben Niederhagen. Following on from last weeks lecture on finite fields, we now see how to use

Add to Reading List

Source URL: www.martindale.info

Language: English - Date: 2017-10-30 08:34:28
    12

    Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as ReportVerifiable Elections That Scale for Free Melissa Cha

    Add to Reading List

    Source URL: cseweb.ucsd.edu

    Language: English - Date: 2012-12-14 15:13:49
      13

      TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Practice Exam Cryptology I, Friday 14 January 2011 Name

      Add to Reading List

      Source URL: www.hyperelliptic.org

      Language: English - Date: 2011-01-17 19:05:56
        14

        Appears in P. J. Lee, C. H. Lim (Eds.): Information Security and Cryptology – ICISC 2002, Springer-Verlag LNCS 2587, pp. 298–312, ISBN, 2003. Improved Techniques for Fast Exponentiation Bodo M¨oller Te

        Add to Reading List

        Source URL: www.bmoeller.de

        Language: English - Date: 2006-01-02 00:24:26
          15

          Cryptology ePrint Archive, Report, http://eprint.iacr.org/ Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification Bodo M¨oller and Andy Rupp

          Add to Reading List

          Source URL: www.bmoeller.de

          Language: English - Date: 2008-05-19 15:51:37
            16

            ISTECRYPT European Network of Excellence in Cryptology Network of Excellence Information Society Technologies

            Add to Reading List

            Source URL: www.ecrypt.eu.org

            Language: English - Date: 2008-11-19 10:24:39
              17

              TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptology, Wednesday 14 December 2016 Name

              Add to Reading List

              Source URL: www.hyperelliptic.org

              Language: English - Date: 2016-12-14 13:13:52
                18Locksmithing / Security / Prevention / Gates / Rekeying / Bit / Pin tumbler lock / Master keying / Lock / Padlock / Lever tumbler lock / Warded lock

                Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks Matt Blaze AT&T Labs – Research , PREPRINT — 15 SeptRevised 2 MarchA version o

                Add to Reading List

                Source URL: www.mattblaze.org

                Language: English - Date: 2003-03-10 20:37:31
                19

                J. Cryptology:Journal of CryptologyInternational Association for Cryptologic Research

                Add to Reading List

                Source URL: www.chaum.com

                Language: English - Date: 2017-08-15 16:01:03
                  20

                  Cryptology Fall 2017 Chloe Martindale TU/e October 12, 2017 These notes are based on notes by Tanja Lange. Recall from last time that we defined an Edwards curve to be a curve of the form

                  Add to Reading List

                  Source URL: www.martindale.info

                  Language: English - Date: 2017-10-30 08:34:06
                    UPDATE