Cryptography

Results: 21893



#Item
111Lehrstuhl f¨ur Theoretische Informationstechnik  Homework 5 in Cryptography I Prof. Dr. Rudolf Mathar, Wolfgang Meyer zu Bergsten, Michael Reyer

Lehrstuhl f¨ur Theoretische Informationstechnik Homework 5 in Cryptography I Prof. Dr. Rudolf Mathar, Wolfgang Meyer zu Bergsten, Michael Reyer

Add to Reading List

Source URL: www.ti.rwth-aachen.de

- Date: 2008-11-24 01:25:56
    112Standards for Efficient Cryptography  SEC 1: Elliptic Curve Cryptography Certicom Research Contact: Daniel R. L. Brown () May 21, 2009

    Standards for Efficient Cryptography SEC 1: Elliptic Curve Cryptography Certicom Research Contact: Daniel R. L. Brown () May 21, 2009

    Add to Reading List

    Source URL: www.secg.org

    Language: English - Date: 2015-01-29 09:45:12
      113Quantum computers and factoring Learning with errors Cryptography from LWE From linear algebra to post-quantum cryptography

      Quantum computers and factoring Learning with errors Cryptography from LWE From linear algebra to post-quantum cryptography

      Add to Reading List

      Source URL: pqcrypto.eu.org

      Language: English - Date: 2016-11-21 18:19:16
        114Published in Designs, Codes and Cryptography, 77(2):441–477, Linearly Homomorphic Structure-Preserving Signatures and Their Applications Benoˆıt Libert · Thomas Peters · Marc Joye · Moti Yung

        Published in Designs, Codes and Cryptography, 77(2):441–477, Linearly Homomorphic Structure-Preserving Signatures and Their Applications Benoˆıt Libert · Thomas Peters · Marc Joye · Moti Yung

        Add to Reading List

        Source URL: joye.site88.net

        Language: English - Date: 2015-10-02 18:24:31
          115Published in D. Naccache, Ed., Cryptography and Security: From Theory to Applications (Quisquater Festschrift), volof Lecture Notes in Computer Science, pp. 3-7, Springer, 2012. On Quisquater’s Multiplication Al

          Published in D. Naccache, Ed., Cryptography and Security: From Theory to Applications (Quisquater Festschrift), volof Lecture Notes in Computer Science, pp. 3-7, Springer, 2012. On Quisquater’s Multiplication Al

          Add to Reading List

          Source URL: joye.site88.net

          Language: English - Date: 2015-09-04 19:43:51
            116The Brave New World of Bodacious Assumptions in Cryptography Neal Koblitz and Alfred Menezes  T

            The Brave New World of Bodacious Assumptions in Cryptography Neal Koblitz and Alfred Menezes T

            Add to Reading List

            Source URL: www.ams.org

            Language: English - Date: 2010-02-10 08:51:31
              1172010 23rd IEEE Computer Security Foundations Symposium  Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks Boris K¨opf MPI-SWS

              2010 23rd IEEE Computer Security Foundations Symposium Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks Boris K¨opf MPI-SWS

              Add to Reading List

              Source URL: users.cis.fiu.edu

              Language: English - Date: 2014-09-02 15:19:21
                118Tail bounds and applications in Cryptography Giorgos Panagiotakos Introduction to Modern Cryptography Course Organizer: Prof. Aggelos Kiayias  October 26, 2016

                Tail bounds and applications in Cryptography Giorgos Panagiotakos Introduction to Modern Cryptography Course Organizer: Prof. Aggelos Kiayias October 26, 2016

                Add to Reading List

                Source URL: www.kiayias.com

                Language: English - Date: 2016-11-15 15:31:31
                  119TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptography 1, Monday 11 April 2011 Name

                  TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptography 1, Monday 11 April 2011 Name

                  Add to Reading List

                  Source URL: www.hyperelliptic.org

                  Language: English - Date: 2011-09-06 00:59:21
                    120Cryptography Working Group

                    Cryptography Working Group

                    Add to Reading List

                    Source URL: www.win.tue.nl

                    - Date: 2015-02-21 08:14:30