<--- Back to Details
First PageDocument Content
Tom Berson / Workshop on Cryptographic Hardware and Embedded Systems / International Cryptology Conference / Asiacrypt / PKC / Theory of Cryptography Conference / Journal of Cryptology / Bart Preneel / Cryptography / International Association for Cryptologic Research / Eurocrypt
Date: 2013-08-16 17:55:40
Tom Berson
Workshop on Cryptographic Hardware and Embedded Systems
International Cryptology Conference
Asiacrypt
PKC
Theory of Cryptography Conference
Journal of Cryptology
Bart Preneel
Cryptography
International Association for Cryptologic Research
Eurocrypt

Microsoft PowerPoint - IACR_Membership_Meeting_EC2013_publicv1

Add to Reading List

Source URL: www.iacr.org

Download Document from Source Website

File Size: 1,75 MB

Share Document on Facebook

Similar Documents

Digital media / Research / Shai Halevi / International Association for Cryptologic Research / Theory of Cryptography Conference / Electronic submission / Cryptography / Academic publishing

TCC 2016­B Call for Papers Submission Deadline   Friday, May 20, 2016, Anywhere on Earth Notification of Decision

DocID: 1pIfA - View Document

International Association for Cryptologic Research Christian Cachin President, IACR May 2014

DocID: 1eE4p - View Document

International Association for Cryptologic Research Christian Cachin President, IACR EUROCRYPT 2015

DocID: 1dpwG - View Document

Tom Berson / Workshop on Cryptographic Hardware and Embedded Systems / International Cryptology Conference / Asiacrypt / PKC / Theory of Cryptography Conference / Journal of Cryptology / Bart Preneel / Cryptography / International Association for Cryptologic Research / Eurocrypt

Microsoft PowerPoint - IACR_Membership_Meeting_EC2013_publicv1

DocID: 1avRX - View Document

Finite fields / Electronic commerce / Key size / RSA / Key / Elliptic curve cryptography / Brute-force attack / XTR / Cryptanalysis / Cryptography / Public-key cryptography / Key management

J. Cryptology: 255–293 DOI: s00145 © 2001 International Association for Cryptologic Research Selecting Cryptographic Key Sizes

DocID: 141od - View Document