CS-Cipher

Results: 180



#Item
51APPLICATIONS OF A TECHNIQUE FOR LABELLED ENUMERATION* by Brendan D. McKay Computer Science Department Vanderbilt University Nashville, Tennessee 37235

APPLICATIONS OF A TECHNIQUE FOR LABELLED ENUMERATION* by Brendan D. McKay Computer Science Department Vanderbilt University Nashville, Tennessee 37235

Add to Reading List

Source URL: cs.anu.edu.au

Language: English - Date: 2007-03-24 07:49:39
52CSCI-GAMATH-GAIntroduction to Cryptography  April 25, 2012

CSCI-GAMATH-GAIntroduction to Cryptography April 25, 2012

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2012-04-18 13:05:18
53Automated Analysis and Synthesis of Block-Cipher Modes of Operation Alex J. Malozemoff Jonathan Katz

Automated Analysis and Synthesis of Block-Cipher Modes of Operation Alex J. Malozemoff Jonathan Katz

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2014-05-16 05:57:05
54Secure protocols for accountable warrant execution Joshua A. Kroll  Edward W. Felten

Secure protocols for accountable warrant execution Joshua A. Kroll Edward W. Felten

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2014-04-02 08:24:08
55A Modular Framework for Building Variable-Input-Length Tweakable Ciphers Thomas Shrimpton and R. Seth Terashima Dept. of Computer Science, Portland State University {teshrim,seth}@cs.pdx.edu

A Modular Framework for Building Variable-Input-Length Tweakable Ciphers Thomas Shrimpton and R. Seth Terashima Dept. of Computer Science, Portland State University {teshrim,seth}@cs.pdx.edu

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-22 14:42:30
56! ~ln-ah~ctkm  Graphics, and image Pet c:essing  J.D. f:oIe,..,

! ~ln-ah~ctkm Graphics, and image Pet c:essing J.D. f:oIe,..,

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-02-06 13:37:31
57Privacy-Preserving Aggregation of Time-Series Data Elaine Shi PARC/UC Berkeley T-H. Hubert Chan The University of Hong Kong

Privacy-Preserving Aggregation of Time-Series Data Elaine Shi PARC/UC Berkeley T-H. Hubert Chan The University of Hong Kong

Add to Reading List

Source URL: i.cs.hku.hk

Language: English - Date: 2011-02-10 19:20:15
58Multi-Dimensional Range Query over Encrypted Data ∗ Elaine Shi John Bethencourt T-H. Hubert Chan Dawn Song Carnegie Mellon University Abstract We design an encryption scheme called Multi-dimensional

Multi-Dimensional Range Query over Encrypted Data ∗ Elaine Shi John Bethencourt T-H. Hubert Chan Dawn Song Carnegie Mellon University Abstract We design an encryption scheme called Multi-dimensional

Add to Reading List

Source URL: i.cs.hku.hk

Language: English - Date: 2007-09-09 14:20:24
59Biological Applications of Multi-Relational Data Mining David Page Mark Craven  Dept. of Biostatistics and Medical Informatics

Biological Applications of Multi-Relational Data Mining David Page Mark Craven Dept. of Biostatistics and Medical Informatics

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2003-07-18 18:35:57
60Input Generation via Decomposition and Re-Stitching: Finding Bugs in Malware Juan Caballero Pongsin Poosankam

Input Generation via Decomposition and Re-Stitching: Finding Bugs in Malware Juan Caballero Pongsin Poosankam

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28