1![Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1 Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1](https://www.pdfsearch.io/img/0cbacae414f8111a2e8d5d4b62fd9258.jpg) | Add to Reading ListSource URL: www.normalesup.orgLanguage: English - Date: 2014-08-03 16:15:38
|
---|
2![Algorithm and Implementation Optimisation of Cryptographic Computation over Elliptic Curves (F2m ) Jean-Marc ROBERT Team DALI/LIRMM, University of Perpignan, France Perpignan, the 30th of may 2012 Algorithm and Implementation Optimisation of Cryptographic Computation over Elliptic Curves (F2m ) Jean-Marc ROBERT Team DALI/LIRMM, University of Perpignan, France Perpignan, the 30th of may 2012](https://www.pdfsearch.io/img/4d180077e9be636c9562f70f92d7dbf4.jpg) | Add to Reading ListSource URL: raim2012.u-bourgogne.frLanguage: English - Date: 2012-07-16 09:25:38
|
---|
3![How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de](https://www.pdfsearch.io/img/c0311beb27007c20cc4db7fd478a69e7.jpg) | Add to Reading ListSource URL: www.ei.rub.deLanguage: English - Date: 2016-05-24 15:16:00
|
---|
4![Network Working Group Request for Comments: 4492 Category: Informational S. Blake-Wilson SafeNet Network Working Group Request for Comments: 4492 Category: Informational S. Blake-Wilson SafeNet](https://www.pdfsearch.io/img/97988b597c4c46727706e2b3bbcde4ce.jpg) | Add to Reading ListSource URL: iaoc.ietf.orgLanguage: English - Date: 2016-02-04 15:25:45
|
---|
5![Proceedings - NN - Password Authenticated Key Agreement for Contactless Smart Cards Proceedings - NN - Password Authenticated Key Agreement for Contactless Smart Cards](https://www.pdfsearch.io/img/fa0b8ba09d204b0e1fbb7fdcc7db52fc.jpg) | Add to Reading ListSource URL: events.iaik.tugraz.atLanguage: English - Date: 2008-07-17 01:45:53
|
---|
6![Abelian varieties, Theta functions and cryptography MSR presentation Damien Robert1 1 Abelian varieties, Theta functions and cryptography MSR presentation Damien Robert1 1](https://www.pdfsearch.io/img/63020b36e8731c4eda3d757ddcb0dcd4.jpg) | Add to Reading ListSource URL: www.normalesup.orgLanguage: English - Date: 2013-11-15 16:58:00
|
---|
7![How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de](https://www.pdfsearch.io/img/9682a17ab629ca17d5b77a75bf43a4d5.jpg) | Add to Reading ListSource URL: www.nds.rub.deLanguage: English - Date: 2016-05-24 15:16:00
|
---|
8![A Cross-Protocol Attack on the TLS Protocol Nikos Mavrogiannopoulos Frederik Vercauteren Vesselin Velichkov A Cross-Protocol Attack on the TLS Protocol Nikos Mavrogiannopoulos Frederik Vercauteren Vesselin Velichkov](https://www.pdfsearch.io/img/1c40396b704e9b90ab574b5d9009a46d.jpg) | Add to Reading ListSource URL: securewww.esat.kuleuven.beLanguage: English |
---|
9![Useful Stuff Benjamin Smith Context Algebraic Curves Useful Stuff Useful Stuff Benjamin Smith Context Algebraic Curves Useful Stuff](https://www.pdfsearch.io/img/0e318146cf682031c6ba601c38d624c3.jpg) | Add to Reading ListSource URL: ecc2011.loria.frLanguage: English - Date: 2011-09-30 12:40:05
|
---|
10![Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields Motivation - Exotic Security Assumptions in Cryptography Main Algorithm and Results Oracle-assisted Static DHP for binary curves On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields](https://www.pdfsearch.io/img/5a7e02e0ff9eb4fb2412f915a7666527.jpg) | Add to Reading ListSource URL: 2010.eccworkshop.orgLanguage: English - Date: 2010-10-25 19:46:00
|
---|