Cryptology

Results: 302



#Item
71

Registration Form The 7th Int. Conference on Cryptology in Africa - Morocco (AfricacryptParticipant: Mr or Ms Author or non-author:____________________________________ Student or non-student:_____________

Add to Reading List

Source URL: www.ensias.ma

Language: English - Date: 2014-03-08 15:47:40
    72

    TSpecial Course on Cryptology: Privacy-Preserving Frequent Itemset Mining on Horizontally Distributed Data Sven Laur February 16, 2004

    Add to Reading List

    Source URL: lepo.it.da.ut.ee

    Language: English - Date: 2004-02-16 04:09:51
      73

      Call for Papers 6th International Conference on Cryptology AFRICACRYPT 2013 June 22-24, 2013, Cairo, Egypt http://www.egyptscience.net/Africacrypt2013/ Confirmed Invited Speaker: Taher El Gamal, Inventor of ElGamal Encry

      Add to Reading List

      Source URL: egyptscience.net

      Language: English - Date: 2013-02-03 01:28:40
        74

        The 5nd International Conference on Cryptology and Network Security (CANS~10 Dec 2006, Suzhou, P.R.China http://www.bg-hotel.com/eindex.htm

        Add to Reading List

        Source URL: cis.sjtu.edu.cn

        Language: English - Date: 2007-12-24 08:58:28
          75

          WEWoRC 2011, We–Fr July 20–22 in Weimnar, Germany Western European Workshop on Research in Cryptology I I

          Add to Reading List

          Source URL: fse2011.mat.dtu.dk

          - Date: 2011-02-14 02:18:26
            76

            ICISC 2011 Call for papers The 14th Annual International Conference on Information Security and Cryptology November 30 ~ December 2, 2011, Seoul, Korea http://www.icisc.org/ Original research papers on all aspects of the

            Add to Reading List

            Source URL: www.icisc.org

            Language: English - Date: 2016-01-16 13:27:12
              77

              The control of Cryptography Past, Present and Future Intelligence versus Forensics Aspects Eric Filiol ESIEA - Operational cryptology and Virology Lab (C + V)O https://sites.google.com/site/ericfiliol

              Add to Reading List

              Source URL: is-ra.org

              Language: English - Date: 2015-08-23 13:12:31
                78Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / Ciphertext / RSA / Encryption / Cipher / Semantic security / Authenticated encryption

                A preliminary version of this paper appears in Advances in Cryptology - EUROCRYPT ’12 Proceedings. Lecture Notes in Computer Science, Vol. 7237, pp. 682–699, Pointcheval, D.; Johansson T. eds., Springer, 2012. This i

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2015-02-17 07:57:12
                79

                A preliminary version of this paper appeared in: T. Ristenpart, H. Shacham, and T. Shrimpton. Careful with Composition: Limitations of the Indifferentiability Framework. Advances in Cryptology – EUROCRYPT ’11, LNCS v

                Add to Reading List

                Source URL: web.cecs.pdx.edu

                Language: English - Date: 2011-06-27 19:07:47
                  80

                  The 21st Annual International Conference on the Theory and Application of Cryptology and Information Security, will be held at the University of Auckland in New Zealand on November 29 to December 3, 2015. Early registrat

                  Add to Reading List

                  Source URL: www.math.auckland.ac.nz

                  - Date: 2015-11-25 21:41:16
                    UPDATE