Deterministic encryption
Results: 55
# | Item |
---|---|
51![]() | CS255: Cryptography and Computer Security Winter 2013 Final Exam Instructions:Add to Reading ListSource URL: crypto.stanford.eduLanguage: English - Date: 2014-02-13 00:34:50 |
52![]() | RSA Laboratories’ CryptoBytes. Volume 5, No. 1 – Winter/Spring 2002, pages 9–19. How to Encrypt Properly with RSAAdd to Reading ListSource URL: www.di.ens.frLanguage: English - Date: 2002-06-27 16:53:41 |
53![]() | Journal of Cryptology, Volume 17, Number 2. Pages 81–104, Springer-Verlag, 2004.Add to Reading ListSource URL: www.di.ens.frLanguage: English - Date: 2004-04-30 07:59:55 |
54![]() | PDF DocumentAdd to Reading ListSource URL: www.di.ens.frLanguage: English - Date: 2004-04-30 07:59:55 |
55![]() | PDF DocumentAdd to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2005-05-04 15:59:05 |