Cryptography

Results: 21893



#Item
91

This is Chapter 7 by Gerhard Frey and Tanja Lange of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC PressCRC Press has granted the foll

Add to Reading List

Source URL: hyperelliptic.org

Language: English - Date: 2014-03-13 14:22:38
    92

    Cryptography Working Group

    Add to Reading List

    Source URL: www.win.tue.nl

    - Date: 2016-03-22 07:04:06
      93

      USING TIMED-RELEASE CRYPTOGRAPHY TO MITIGATE PRESERVATION RISK OF EMBARGO PERIODS by Rabia Haq B.S. August 2004, Old Dominion University

      Add to Reading List

      Source URL: www.cs.odu.edu

      Language: English - Date: 2009-12-04 17:52:42
        94

        Cryptography, homework sheet 4 Due for 2MMC10: 06 October 2016, 10:45 and for Mastermath: 03 November 2016, 10:45 by email to Team up in groups of two or three to hand in your homework. We do not hav

        Add to Reading List

        Source URL: www.hyperelliptic.org

        Language: English - Date: 2016-09-29 12:48:05
          95

          This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

          Add to Reading List

          Source URL: cacr.uwaterloo.ca

          Language: English - Date: 2011-07-10 02:35:13
            96

            CS355: Topics in cryptography Spring 2014 Assignment #2 Due: Tuesday, June 3, 2014.

            Add to Reading List

            Source URL: crypto.stanford.edu

            Language: English - Date: 2014-05-29 16:56:32
              97

              Post-quantum cryptography Daniel J. Bernstein1 Tanja Lange1 Peter Schwabe2

              Add to Reading List

              Source URL: pqcrypto.eu.org

              Language: English - Date: 2016-09-13 19:59:32
                98Cryptography / Cryptanalysis / RSA / Quantum computing / Public-key cryptography / Symmetric-key algorithm / Cryptographic primitive / Stream cipher / Block cipher / One-way function / Chosen-plaintext attack / Cryptographic hash function

                Dartmouth College Computer Science Technical Report TR2002The Future of Cryptography Under Quantum Computers

                Add to Reading List

                Source URL: www.cs.dartmouth.edu

                Language: English
                99Cryptography / Security engineering / Cyberwarfare / Applied mathematics / Security / Crime prevention / Information governance / National security / RSA Security / Crypto / Strong cryptography / Computer security

                Cryptography Lecture 0 Manoj Prabhakaran University of Illinois Urbana-Champaign

                Add to Reading List

                Source URL: courses.engr.illinois.edu

                Language: English - Date: 2016-01-19 12:43:28
                UPDATE