.bo

Results: 14183



#Item
1Cryptography / Public-key cryptography / Commitment scheme / Secret sharing / Computational hardness assumption / Digital signature / Entropy / XTR

Efficient String-Commitment from Weak Bit-Commitment Kai-Min Chung1, , Feng-Hao Liu2, , Chi-Jen Lu3 , and Bo-Yin Yang3 1 2

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-03-20 04:03:37
2

PROGRAMA DE EDUCACION FINANCIERA 3 CAPOS

Add to Reading List

Source URL: www.redenlace.com.bo

Language: Spanish - Date: 2018-06-15 17:26:24
    3Cryptography / Multivariate cryptography / Finite fields / Post-quantum cryptography / Hidden Field Equations / Unbalanced Oil and Vinegar / Trapdoor function / XTR / QUAD / Mutation / Digital signature

    -Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1 University of Cincinnati and Technische Universität Darmstadt

    Add to Reading List

    Source URL: precision.moscito.org

    Language: English - Date: 2011-03-20 04:03:42
    4Connection / Partial differential equations / Mathematical analysis / Operator theory / Finite automata / Mathematics

    On Elicitation and Mechanism Design Bo Waggoner, UPenn January

    Add to Reading List

    Source URL: www.bowaggoner.com

    Language: English - Date: 2017-07-12 06:17:01
    5Computer architecture / Cryptography / Computing / NIST hash function competition / Instruction set architectures / Cryptographic hash functions / Assembly languages / Grstl / ARM architecture / SHA-2 / 64-bit computing / Addressing mode

    SHA-3 on ARM11 processors Peter Schwabe1 , Bo-Yin Yang1 , and Shang-Yi Yang2 1 ?

    Add to Reading List

    Source URL: precision.moscito.org

    Language: English - Date: 2013-02-27 00:13:54
    6

    Delphy Foundation: Revolutionary Platform for Predicting Future Events Bo Wang Abstract

    Add to Reading List

    Source URL: delphy.org

    Language: English - Date: 2018-09-10 06:47:48
      7Cryptography / Multivariate cryptography / Hidden Field Equations / Unbalanced Oil and Vinegar / Circulant matrix / RSA / Elliptic Curve Digital Signature Algorithm / QUAD

      Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems Bo-Yin Yang1, , Chen-Mou Cheng2 , Bor-Rong Chen2 , and Jiun-Ming Chen3 1 3

      Add to Reading List

      Source URL: precision.moscito.org

      Language: English - Date: 2011-03-20 04:03:40
      8Cryptography / Post-quantum cryptography / Multivariate cryptography / Finite fields / Lattice-based cryptography / Hidden Field Equations / Learning with errors / QUAD / RSA / Reduction / Computational hardness assumption / Ideal lattice cryptography

      Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3

      Add to Reading List

      Source URL: precision.moscito.org

      Language: English - Date: 2012-04-04 23:26:12
      UPDATE