Cryptology

Results: 302



#Item
21

MATHEMATICAL CRYPTOLOGY Keijo Ruohonen (Translation by Jussi Kangas and Paul Coughlan

Add to Reading List

Source URL: math.tut.fi

Language: English - Date: 2017-07-01 07:05:26
    22

    Block ciphers and AES Cryptology, 2016 Autumn Joan Daemen Institute for Computing and Information Sciences Radboud University September 27, 2016

    Add to Reading List

    Source URL: hyperelliptic.org

    Language: English - Date: 2016-09-27 22:29:12
      23

      TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptology, Tuesday 24 January 2017 Name

      Add to Reading List

      Source URL: www.hyperelliptic.org

      Language: English - Date: 2017-02-12 10:18:35
        24

        On the notion of bit complexity Claus Diem August 21, 2010 Abstract In many works in the fields of computational complexity, algorithmic number theory and mathematical cryptology as well as in related areas, claims on th

        Add to Reading List

        Source URL: www.mathematik.uni-leipzig.de

        Language: English - Date: 2010-08-21 13:57:07
          25

          TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptology, Tuesday 01 November 2016 Name

          Add to Reading List

          Source URL: www.hyperelliptic.org

          Language: English - Date: 2016-11-28 06:01:51
            26

            Published in Journal of Cryptology, 30(2):519–549, Efficient Cryptosystems From 2k -th Power Residue Symbols? Fabrice Benhamouda1 , Javier Herranz2 , Marc Joye3 , and Benoît Libert4,?? 1

            Add to Reading List

            Source URL: joye.site88.net

            Language: English - Date: 2017-08-06 12:22:24
              27Algebra / Abstract algebra / Mathematics / Polynomials / Computer algebra / Invariant theory / Commutative algebra / Homogeneous polynomials / Monomial order / Polynomial ring / Faugre's F4 and F5 algorithms / Hidden Field Equations

              M4GB: An efficient Gr¨obner-basis algorithm Rusydi H. Makarim Marc Stevens Cryptology Group, Centrum Wiskunde en Informatica

              Add to Reading List

              Source URL: marc-stevens.nl

              Language: English - Date: 2017-08-13 07:48:58
              28

              EUROCRYPT 2010 29th Annual International Conference on Cryptology – Monaco (France) Algebraic Cryptanalysis of McEliece Variants with Compact Keys Jean-Charles Faug`

              Add to Reading List

              Source URL: crypto.rd.francetelecom.com

              Language: English - Date: 2010-06-26 07:33:57
                29

                Introduction to Cryptology Concepts I Introduction to the Tutorial Navigation Navigating through the tutorial is easy: Use the Next and Previous buttons to move forward and backward. Use the Menu button to return to the

                Add to Reading List

                Source URL: gnosis.cx

                Language: English - Date: 2001-02-09 14:36:14
                  30

                  Efficient Arithmetic on Binary Genus-2 Curves Peter Birkner and Tanja Lange Eindhoven University of Technology, The Netherlands Western European Workshop on Research in Cryptology

                  Add to Reading List

                  Source URL: www.pbirkner.fastmail.fm

                  Language: English - Date: 2009-09-18 08:49:55
                    UPDATE