101![Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. 3017, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. 3017, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P](https://www.pdfsearch.io/img/5ee51173e022dcf9435866b7752d49a5.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2009-08-09 19:41:15
|
---|
102![- Call for papers The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: t.a - Call for papers The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: t.a](https://www.pdfsearch.io/img/3bb7610d841b8055df5eaa4c5ba45a49.jpg) | Add to Reading ListSource URL: security-lab.jaist.ac.jpLanguage: English - Date: 2015-08-13 01:39:17
|
---|
103![RFC6962-bis update ● ● Some tweaking still needed. Last call should wait for our implementation. RFC6962-bis update ● ● Some tweaking still needed. Last call should wait for our implementation.](https://www.pdfsearch.io/img/34946cae62516df3eb23d1fd401265fb.jpg) | Add to Reading ListSource URL: www.ietf.orgLanguage: English - Date: 2015-07-23 10:29:05
|
---|
104![Appears in Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS ’03). The Hash History Approach for Reconciling Mutual Inconsistency Brent ByungHoon Kang, Robert Wilensky and J Appears in Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS ’03). The Hash History Approach for Reconciling Mutual Inconsistency Brent ByungHoon Kang, Robert Wilensky and J](https://www.pdfsearch.io/img/558e99b9688a040413388aba9549ac53.jpg) | Add to Reading ListSource URL: www.oceanstore.orgLanguage: English - Date: 2003-03-13 15:50:35
|
---|
105![SPHINCS: practical stateless hash-based signatures 1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , 3 4 4 Ruben Niederhagen , Louiza Papachristodoulou , Peter Schwabe , and SPHINCS: practical stateless hash-based signatures 1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , 3 4 4 Ruben Niederhagen , Louiza Papachristodoulou , Peter Schwabe , and](https://www.pdfsearch.io/img/8df7ae2caac58c372d1badd6116a62d4.jpg) | Add to Reading ListSource URL: cryptojedi.orgLanguage: English - Date: 2014-10-04 10:08:48
|
---|
106![SafeSlinger: Easy-to-Use and Secure Public-Key Exchange Michael Farb Yue-Hsun Lin Tiffany Hyun-Jin Kim SafeSlinger: Easy-to-Use and Secure Public-Key Exchange Michael Farb Yue-Hsun Lin Tiffany Hyun-Jin Kim](https://www.pdfsearch.io/img/5d9e30c75e3200353b87181067c7cd0c.jpg) | Add to Reading ListSource URL: www.netsec.ethz.chLanguage: English - Date: 2015-06-01 09:06:14
|
---|
107![A new MAC Construction Alred and a Specific Instance Alpha-MAC Joan Daemen1 and Vincent Rijmen2,3 1 2 A new MAC Construction Alred and a Specific Instance Alpha-MAC Joan Daemen1 and Vincent Rijmen2,3 1 2](https://www.pdfsearch.io/img/9933b52916f2a1dda9a67b12ae54b1b7.jpg) | Add to Reading ListSource URL: jda.noekeon.orgLanguage: English - Date: 2013-08-28 07:53:26
|
---|
108![Validating Web Content with Senser Jordan Wilberding Georgetown University Andrew Yates Georgetown University Validating Web Content with Senser Jordan Wilberding Georgetown University Andrew Yates Georgetown University](https://www.pdfsearch.io/img/b9f65867077ae6e95a56f9ed33071c62.jpg) | Add to Reading ListSource URL: security.cs.georgetown.eduLanguage: English - Date: 2013-10-29 13:52:26
|
---|
109![](https://www.pdfsearch.io/img/dc8aea6284c1c5bb5ac73bbaffea94a2.jpg) | Add to Reading ListSource URL: jda.noekeon.orgLanguage: English - Date: 2013-08-28 07:53:23
|
---|
110![Deterministic wallets End Deterministic wallets Gregory Maxwell et. al. Deterministic wallets End Deterministic wallets Gregory Maxwell et. al.](https://www.pdfsearch.io/img/5b1167682d9dbbb81099e9b2a1db5e22.jpg) | Add to Reading ListSource URL: www.cs.technion.ac.ilLanguage: English - Date: 2014-05-26 22:22:44
|
---|