NTRU

Results: 123



#Item
51SSLShader: Cheap SSL Acceleration with Commodity Processors Keon Jang+ , Sangjin Han+ , Seungyeop Han* , Sue Moon+ , and KyoungSoo Park+ + KAIST *University of Washington

SSLShader: Cheap SSL Acceleration with Commodity Processors Keon Jang+ , Sangjin Han+ , Seungyeop Han* , Sue Moon+ , and KyoungSoo Park+ + KAIST *University of Washington

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2011-04-04 22:37:44
52The Future of Cryptography Practice and Theory Adam Young, Ph.D. Cigital, Inc[removed]Ridgetop Circle

The Future of Cryptography Practice and Theory Adam Young, Ph.D. Cigital, Inc[removed]Ridgetop Circle

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
53Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures Phong Q. Nguyen?1 and Oded Regev??2 ´ CNRS & Ecole normale sup´erieure, DI, 45 rue d’Ulm, 75005 Paris, France.

Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures Phong Q. Nguyen?1 and Oded Regev??2 ´ CNRS & Ecole normale sup´erieure, DI, 45 rue d’Ulm, 75005 Paris, France.

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 01:06:09
54Attribute-Based Credentials for Trust  D3.1 Scientific comparison of ABC protocols Part II: Practical comparison

Attribute-Based Credentials for Trust D3.1 Scientific comparison of ABC protocols Part II: Practical comparison

Add to Reading List

Source URL: abc4trust.eu

Language: English - Date: 2014-08-28 02:52:31
55Post-quantum cryptography / Standards organizations / Public-key cryptography / NTRU / ID-based encryption / Institute of Electrical and Electronics Engineers / Pairing / Cryptography / IEEE standards / IEEE P1363

IEEE P1363.3: Standard for Identity-Based Cryptographic Techniques using Pairings CALL FOR SUBMISSIONS Contributions are requested for the IEEE P1363.3 project, "Standard for Identity-Based Cryptographic Techniques usin

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-04-27 09:53:33
56Microsoft PowerPoint - preneel_chinacrypt_aug14_v1.pptx

Microsoft PowerPoint - preneel_chinacrypt_aug14_v1.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2014-08-28 01:07:14
57Cryptographic Hash Workshop

Cryptographic Hash Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:11:24
58Elliptic Curve PKI An exploration of the benefits and challenges of a PKI based on elliptic curve cryptography Get this White Paper

Elliptic Curve PKI An exploration of the benefits and challenges of a PKI based on elliptic curve cryptography Get this White Paper

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2013-05-03 16:51:59
59Memorandum regarding meeting with representatives of Information Assurance Consortium on S7-27-03

Memorandum regarding meeting with representatives of Information Assurance Consortium on S7-27-03

Add to Reading List

Source URL: www.sec.gov

Language: English - Date: 2006-01-05 20:51:08
60The CRYPTREC Policy to Evaluate the Submitted Public Key Systems October 10, 2001 Tsutomu Matsumoto Chair, Public-Key Subcommittee

The CRYPTREC Policy to Evaluate the Submitted Public Key Systems October 10, 2001 Tsutomu Matsumoto Chair, Public-Key Subcommittee

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45