Hash-based cryptography

Results: 78



#Item
71Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin

Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-12-20 13:03:42
72CS255: Cryptography and Computer Security  Winter 2010

CS255: Cryptography and Computer Security Winter 2010

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-02-10 16:51:29
73Fast Software-Based Attacks on SecurID Scott Contini1 and Yiqun Lisa Yin2 1 Macquarie University, Computing Department, NSW 2109 Australia, [removed],

Fast Software-Based Attacks on SecurID Scott Contini1 and Yiqun Lisa Yin2 1 Macquarie University, Computing Department, NSW 2109 Australia, [removed],

Add to Reading List

Source URL: www.crypto-world.com

Language: English - Date: 2011-04-01 07:21:08
74DRAFT FIPS 202, SHA-3 Standard:  Permutation-Based Hash and Extendable-Output Functions

DRAFT FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-04-09 12:06:39
75Identity-based Chameleon Hash and Applications Giuseppe Ateniese Breno de Medeiros

Identity-based Chameleon Hash and Applications Giuseppe Ateniese Breno de Medeiros

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-03-15 18:18:40
76Fast Software-Based Attacks on SecurID Scott Contini1 and Yiqun Lisa Yinini

Fast Software-Based Attacks on SecurID Scott Contini1 and Yiqun Lisa Yinini

Add to Reading List

Source URL: www.crypto-world.com

- Date: 2011-04-01 07:21:47
77

PDF Document

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2007-05-11 03:26:00
78

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-05 07:41:01