First Page | Document Content | |
---|---|---|
![]() Date: 2010-04-03 00:22:05Electronic commerce Cryptographic protocols Ciphertext Key Password Malware Man-in-the-middle attack RSA Key encapsulation Cryptography Public-key cryptography Key management | Add to Reading List |
![]() | Rank-metric Attack on the Edon-K Key Encapsulation Mechanism Matthieu Lequesne1,2 and Jean-Pierre Tillich2 April 5, Sorbonne Université ParisDocID: 1uhxx - View Document |
![]() | Supersingular Isogeny Key Encapsulation Reza Azarderakhsh, Matthew Campagna, Craig Costello, Luca De Feo, Basil Hess, David Jao, Brian Koziel, Brian LaMacchia, Patrick Longa, Michael Naehrig, Joost Renes, Vladimir SoukhaDocID: 1u5Iq - View Document |
![]() | FrodoKEM Learning With Errors Key Encapsulation Algorithm Specifications And Supporting Documentation November 30,DocID: 1tCj6 - View Document |
![]() | CS 161 Computer Security Spring 2010DocID: 1aqIr - View Document |
![]() | SOA Security What is challenging? ConstructionDocID: 18IJX - View Document |