21![THE FACTORING DEAD: PREPARING FOR THE CRYPTOPOCALYPSE Javed Samuel — javed[at]isecpartners[dot]com iSEC Partners, Inc 123 Mission Street, Suite 1020 San Francisco, CA 94105 THE FACTORING DEAD: PREPARING FOR THE CRYPTOPOCALYPSE Javed Samuel — javed[at]isecpartners[dot]com iSEC Partners, Inc 123 Mission Street, Suite 1020 San Francisco, CA 94105](https://www.pdfsearch.io/img/1813c10bff2fbb697bcdbf7c6fd73689.jpg) | Add to Reading ListSource URL: www.isecpartners.comLanguage: English - Date: 2014-04-02 07:42:28
|
---|
22![Practical Adaptive Oblivious Transfer from Simple Assumptions Matthew Green∗ Johns Hopkins University Susan Hohenberger† Johns Hopkins University Practical Adaptive Oblivious Transfer from Simple Assumptions Matthew Green∗ Johns Hopkins University Susan Hohenberger† Johns Hopkins University](https://www.pdfsearch.io/img/831918f2f5dc03ee9c80a48e43bd89b1.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2011-01-14 14:00:36
|
---|
23![Improvement of Ma ni ke ta l . Improvement of Ma ni ke ta l .](https://www.pdfsearch.io/img/32db8394dc9fcc0bf38b2bfcef52134a.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2005-12-09 05:56:33
|
---|
24![Chapter 10 Number-Theoretic Primitives Number theory is a source of several computational problems that serve as primitives in the design of cryptographic schemes. Asymmetric cryptography in particular relies on these pr Chapter 10 Number-Theoretic Primitives Number theory is a source of several computational problems that serve as primitives in the design of cryptographic schemes. Asymmetric cryptography in particular relies on these pr](https://www.pdfsearch.io/img/e50954108b925208ad374db643b1483e.jpg) | Add to Reading ListSource URL: cseweb.ucsd.eduLanguage: English - Date: 2009-09-20 23:35:30
|
---|
25![Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders Safuat Hamdy Bodo Möller Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders Safuat Hamdy Bodo Möller](https://www.pdfsearch.io/img/54073c54db6133ac4920751ee4dd1bd9.jpg) | Add to Reading ListSource URL: www.bmoeller.deLanguage: English - Date: 2006-01-02 00:23:19
|
---|
26![The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions Brent Waters† University of Texas at Austin The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions Brent Waters† University of Texas at Austin](https://www.pdfsearch.io/img/cf2f1bd39ceeac2d4af974790427c47b.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2012-12-06 19:27:51
|
---|
27![Two novel applications of bilinear groups to ABE encryption Riccardo Longo Department of Mathematics, University of Trento, Italy Chiara Marcolla Department of Mathema Two novel applications of bilinear groups to ABE encryption Riccardo Longo Department of Mathematics, University of Trento, Italy Chiara Marcolla Department of Mathema](https://www.pdfsearch.io/img/e58903c5fe4c288ba920d02a4d47b721.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2014-12-12 11:38:03
|
---|
28![CS355: Topics in cryptography Spring 2014 Assignment #1 Due: Tuesday, May. 13, 2014. CS355: Topics in cryptography Spring 2014 Assignment #1 Due: Tuesday, May. 13, 2014.](https://www.pdfsearch.io/img/7da3c10b066f14a659117015d311b1c9.jpg) | Add to Reading ListSource URL: crypto.stanford.eduLanguage: English - Date: 2014-05-07 00:53:37
|
---|
29![CS255: Cryptography and Computer Security Winter 2001 Final Exam Instructions CS255: Cryptography and Computer Security Winter 2001 Final Exam Instructions](https://www.pdfsearch.io/img/aafa72c4746814b3879dac7bcdab2a2b.jpg) | Add to Reading ListSource URL: crypto.stanford.eduLanguage: English - Date: 2007-01-06 01:59:49
|
---|
30![CS255: Cryptography and Computer Security Winter 2003 Assignment #3 Due: Monday, March 3rd, 2003 at 5pm in CS255 box next to Gates 182. CS255: Cryptography and Computer Security Winter 2003 Assignment #3 Due: Monday, March 3rd, 2003 at 5pm in CS255 box next to Gates 182.](https://www.pdfsearch.io/img/4c8b9df8295af4ab361699bb257494bf.jpg) | Add to Reading ListSource URL: crypto.stanford.eduLanguage: English - Date: 2003-02-18 23:13:10
|
---|