Index of cryptography articles

Results: 178



#Item
11Analysis of CAESAR candidates Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Analysis of CAESAR candidates Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
12- Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

- Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-09 21:16:55
13Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading? Peter Gaˇzi1,2 and Stefano Tessaro3,4 1  Department of Computer Science, Comenius University, Bratislava, Slovakia

Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading? Peter Gaˇzi1,2 and Stefano Tessaro3,4 1 Department of Computer Science, Comenius University, Bratislava, Slovakia

Add to Reading List

Source URL: pub.ist.ac.at

Language: English - Date: 2014-06-19 17:26:59
14Cryptographic Voting: A Tutorial Ben Adida   12 February 2005

Cryptographic Voting: A Tutorial Ben Adida 12 February 2005

Add to Reading List

Source URL: assets.adida.net

Language: English - Date: 2011-04-11 17:40:14
15

PDF Document

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:13
16Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1  University of Maryland

Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1 University of Maryland

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2009-09-07 10:57:44
17Microsoft Word - nljul2005_2_.doc

Microsoft Word - nljul2005_2_.doc

Add to Reading List

Source URL: www.barc.gov.in

Language: English - Date: 2012-08-10 06:17:36
18A SYMMETRIC KEY ENCRYPTION ALGORITHM  MULTI-S01 A SYMMETRIC-KEY ENCRYPTION ALGORITHM:

A SYMMETRIC KEY ENCRYPTION ALGORITHM MULTI-S01 A SYMMETRIC-KEY ENCRYPTION ALGORITHM:

Add to Reading List

Source URL: www.cryptrec.go.jp

Language: English - Date: 2012-06-28 04:48:45
19Security I – exercises Markus Kuhn Lent 2013 – Part IB 1

Security I – exercises Markus Kuhn Lent 2013 – Part IB 1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-02-04 12:37:29
20Security I – exercises Markus Kuhn Lent 2014 – CST Part IB  1

Security I – exercises Markus Kuhn Lent 2014 – CST Part IB 1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-04-22 13:24:19