Cryptography

Results: 21893



#Item
121

A new framework for code-based encryption and more J.-C. Deneuville <> April the 5th , 2018 Code-based Cryptography Workshop

Add to Reading List

Source URL: www.math.fau.edu

Language: English - Date: 2018-04-06 11:47:14
    122

    Chapter 8: Basic Cryptography • Classical Cryptography • Public Key Cryptography • Cryptographic Checksums November 1, 2004

    Add to Reading List

    Source URL: nob.cs.ucdavis.edu

    Language: English - Date: 2004-11-01 01:20:26
      123

      Cryptography Working Group

      Add to Reading List

      Source URL: www.win.tue.nl

      Language: English - Date: 2015-12-08 08:53:02
        124

        Linicrypt: A Model for Practical Cryptography Brent Carmer Mike Rosulek Charles River Crypto Day

        Add to Reading List

        Source URL: web.engr.oregonstate.edu

        Language: English - Date: 2016-12-09 20:49:00
          125

          On the Origin of Trust: Struggle for Secure Cryptography Anne Canteaut Inria, project-team SECRET, Paris, France http://www.rocq.inria.fr/secret/Anne.Canteaut/

          Add to Reading List

          Source URL: www.rocq.inria.fr

          Language: English - Date: 2016-05-10 05:43:56
            126

            Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography Vipul Goyal∗ Yuval Ishai† Mohammad Mahmoody‡ Amit Sahai§ February 18, 2010 Abstract

            Add to Reading List

            Source URL: www.cs.virginia.edu

            Language: English - Date: 2013-09-26 12:37:24
              127

              Isogenies between abelian varieties DAMIEN ROBERT Notes of a talk given for the Conference “Effective moduli spaces and applications to cryptography” — Rennes Abstract. In this talk we give a brief panorama of the

              Add to Reading List

              Source URL: www.normalesup.org

              Language: English - Date: 2014-08-03 16:15:38
                128

                Issues in Informing Science and Information Technology Volume 7, 2010 A Novel Visual Cryptography Coding System for Jam Resistant Communication

                Add to Reading List

                Source URL: leemon.com

                Language: English - Date: 2016-06-20 01:24:06
                  129

                  Hyperelliptic Curves Peter Birkner Technische Universiteit Eindhoven DIAMANT Summer School on Elliptic and Hyperelliptic Curve Cryptography

                  Add to Reading List

                  Source URL: www.pbirkner.fastmail.fm

                  Language: English - Date: 2008-09-19 03:32:20
                    130

                    Post-Quantum CryptographyList of Accepted Papers 1. The Hardness of Code Equivalence over Fq and its Application to Code-based Cryptography Nicolas Sendrier and Dimitris E. Simos

                    Add to Reading List

                    Source URL: pqcrypto2013.xlim.fr

                    Language: English - Date: 2013-06-24 09:53:49
                      UPDATE