Cryptology

Results: 302



#Item
81

TSpecial Course on Cryptology Seminar I: Secure Frequent Itemset Mining Sven Laur Helsinki University of Technology

Add to Reading List

Source URL: lepo.it.da.ut.ee

Language: English - Date: 2004-02-16 04:09:39
    82

    CANS 2011 The 10th International Conference on Cryptology and Network Security In Cooperation With IACR December 10-12, 2011, Sanya, China - Call for Participation (http://www.infosec.sdu.edu.cn/cans2011/)

    Add to Reading List

    Source URL: www.infosec.sdu.edu.cn

    Language: English - Date: 2015-09-17 19:41:56
      83

      Published in P. Sarkar and T. Iwata, Eds, Advances in Cryptology − ASIACRYPT 2014, Part II, volof Lecture Notes in Computer Science, pp. 1-21, Springer, 2014. Concise Multi-Challenge CCA-Secure Encryption and Si

      Add to Reading List

      Source URL: joye.site88.net

      Language: English - Date: 2015-09-04 19:44:09
        84

        Factoring RSA Modulus using Prime Reconstruction from Random Known Bits S. Maitra, S. Sarkar and S. Sen Gupta Cryptology Research Group, ASU

        Add to Reading List

        Source URL: 2010.africacrypt.com

        Language: English - Date: 2010-04-30 15:42:20
          85

          Psychology-based Cryptology: Past Present and Future Yvo Desmedt The University of Texas at Dallas USA

          Add to Reading List

          Source URL: cis.sjtu.edu.cn

          Language: English - Date: 2012-12-10 09:59:42
            86

            ECRYPT II   ICTECRYPT II European Network of Excellence in Cryptology II

            Add to Reading List

            Source URL: www.ecrypt.eu.org

            Language: English - Date: 2010-08-27 16:04:13
              87

              Published in Journal of Cryptology 12(4):241–245, Chinese Remaindering Based Cryptosystems in the Presence of Faults Marc Joye UCL Crypto Group, D´ep. de Math´ematique, Universit´e de Louvain

              Add to Reading List

              Source URL: joye.site88.net

              Language: English - Date: 2015-09-04 19:43:41
                88

                A preliminary version of this paper appears in Advances in Cryptology – ASIACRYPT ‘07, Lecture Notes in Computer Science Vol. 4833, pp. 147–163, K. Kurosawa ed., Springer-Verlag, 2007. This is the full version. How

                Add to Reading List

                Source URL: web.cecs.pdx.edu

                Language: English - Date: 2009-09-29 10:16:48
                  89

                  5th International Cryptology and Information Security Conference 2016 COPYRIGHT AGREEMENT Please complete and sign the form and send it with the final version of your manuscript. It is required to obtain written confirma

                  Add to Reading List

                  Source URL: einspem.upm.edu.my

                  Language: English - Date: 2015-04-10 04:54:13
                    90

                    The 5nd International Conference on Cryptology and Network Security (CANS~10 Dec 2006, Suzhou, P.R.China http://www.bg-hotel.com

                    Add to Reading List

                    Source URL: cis.sjtu.edu.cn

                    Language: Vietnamese - Date: 2007-12-24 08:58:28
                      UPDATE