Crypto

Results: 1625



#Item
91Dash: A Privacy­Centric Crypto­Currency    Evan Duffield ­ ​   Daniel Diaz ­ ​  

Dash: A Privacy­Centric Crypto­Currency    Evan Duffield ­ ​   Daniel Diaz ­ ​  

Add to Reading List

Source URL: blockchainlab.com

Language: English - Date: 2017-04-20 00:53:00
92Rounded Gaussians Fast and Secure Constant-Time Sampling for Lattice-Based Crypto Andreas H¨ ulsing, Tanja Lange, Kit Smeets Department of Mathematics and Computer Science

Rounded Gaussians Fast and Secure Constant-Time Sampling for Lattice-Based Crypto Andreas H¨ ulsing, Tanja Lange, Kit Smeets Department of Mathematics and Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-10-16 08:15:31
    93Profit from Digital Assets Participate in the extraordinary growth in domain names and crypto currencies. Introduction Vision DDF is a fund to invest in digital assets, designed to reduce

    Profit from Digital Assets Participate in the extraordinary growth in domain names and crypto currencies. Introduction Vision DDF is a fund to invest in digital assets, designed to reduce

    Add to Reading List

    Source URL: www.digitaldevelopersfund.com

    Language: English - Date: 2017-08-03 05:00:36
      94Commercial Break  Summer school on post-quantum crypto Eindhoven, 19–23 June 2017 https://2017.pqcrypto.org/school/index.html Executive school on post-quantum crypto

      Commercial Break Summer school on post-quantum crypto Eindhoven, 19–23 June 2017 https://2017.pqcrypto.org/school/index.html Executive school on post-quantum crypto

      Add to Reading List

      Source URL: hyperelliptic.org

      Language: English - Date: 2017-01-28 21:23:45
        95Taklimakan Network  2018 | Ver. 2.0 WHITEPAPER Investment and educational business platform for crypto

        Taklimakan Network 2018 | Ver. 2.0 WHITEPAPER Investment and educational business platform for crypto

        Add to Reading List

        Source URL: taklimakan.io

        Language: English - Date: 2018-07-25 10:51:15
        96Remote Timing Attacks are Practical David Brumley Stanford University  Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

        Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

        Add to Reading List

        Source URL: crypto.stanford.edu

        Language: English - Date: 2010-06-04 16:24:13
          97An introduction to supersingular isogeny-based cryptography Craig Costello Summer School on Real-World Crypto and Privacy June 8, 2017

          An introduction to supersingular isogeny-based cryptography Craig Costello Summer School on Real-World Crypto and Privacy June 8, 2017

          Add to Reading List

          Source URL: www.craigcostello.com.au

          Language: English - Date: 2017-06-10 05:08:02
            98Evading Censorship with Browser-Based Proxies David Fifield1 , Nate Hardison1 , Jonathan Ellithorpe1 , Emily Stark2 , Dan Boneh1 , Roger Dingledine3 , and Phil Porras4 1  2

            Evading Censorship with Browser-Based Proxies David Fifield1 , Nate Hardison1 , Jonathan Ellithorpe1 , Emily Stark2 , Dan Boneh1 , Roger Dingledine3 , and Phil Porras4 1 2

            Add to Reading List

            Source URL: crypto.stanford.edu

            Language: English - Date: 2012-05-01 13:41:51
            99Crypto Evaluation Processes

            Crypto Evaluation Processes

            Add to Reading List

            Source URL: www.yourcreativesolutions.nl

            Language: English - Date: 2011-09-21 17:56:42
              100M2 CRYPTO TP THÉORIE ALGORITHMIQUE DES NOMBRES CHRISTOPHE RITZENTHALER 1. Réseaux Exercice 1. Implémenter l’algorithme de Gauss. On devra utiliser la fonction while

              M2 CRYPTO TP THÉORIE ALGORITHMIQUE DES NOMBRES CHRISTOPHE RITZENTHALER 1. Réseaux Exercice 1. Implémenter l’algorithme de Gauss. On devra utiliser la fonction while

              Add to Reading List

              Source URL: perso.univ-rennes1.fr

              Language: French - Date: 2016-02-07 03:06:17