Cryptography

Results: 21893



#Item
131a Course in Cryptography rafael pass abhi shelat

a Course in Cryptography rafael pass abhi shelat

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2010-08-26 11:46:13
    132CS255: Cryptography and Computer Security  Winter 2010 Final Exam Instructions

    CS255: Cryptography and Computer Security Winter 2010 Final Exam Instructions

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2010-03-21 15:11:32
      133This is the Table of Contents of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC PressCRC Press has granted the following specific permi

      This is the Table of Contents of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC PressCRC Press has granted the following specific permi

      Add to Reading List

      Source URL: hyperelliptic.org

      Language: English - Date: 2006-09-06 22:21:24
        134Eighth International Conference on Post-Quantum Cryptography  PQCrypto 2017 Utrecht, The Netherlands, June 2628, 2017 https://2017.pqcrypto.org

        Eighth International Conference on Post-Quantum Cryptography PQCrypto 2017 Utrecht, The Netherlands, June 2628, 2017 https://2017.pqcrypto.org

        Add to Reading List

        Source URL: 2017.pqcrypto.org

        Language: English - Date: 2017-01-12 18:50:43
        135Budapest University of Technology and Economics Faculty of Electrical Engineering and Informatics Department of Telecommunications Laboratory of Cryptography and System Security (CrySyS Lab.)  Szurdi János

        Budapest University of Technology and Economics Faculty of Electrical Engineering and Informatics Department of Telecommunications Laboratory of Cryptography and System Security (CrySyS Lab.) Szurdi János

        Add to Reading List

        Source URL: janos.szurdi.com

        Language: Hungarian - Date: 2017-11-10 15:47:05
          13620 years of isogeny-based cryptography Luca De Feo feat. Jean Kieffer, Benjamin Smith Université Paris Saclay, UVSQ & Inria  November 14, 2017, Elliptic Curve Cryptography, Nijmegen

          20 years of isogeny-based cryptography Luca De Feo feat. Jean Kieffer, Benjamin Smith Université Paris Saclay, UVSQ & Inria November 14, 2017, Elliptic Curve Cryptography, Nijmegen

          Add to Reading List

          Source URL: defeo.lu

          Language: English - Date: 2018-05-31 20:20:22
            137Cryptography from Sunspots: How to Use an Imperfect Reference String Ran Canetti∗† IBM  Rafael Pass‡†

            Cryptography from Sunspots: How to Use an Imperfect Reference String Ran Canetti∗† IBM Rafael Pass‡†

            Add to Reading List

            Source URL: people.csail.mit.edu

            Language: English - Date: 2007-12-16 00:26:33
              138Leakage Resilient Cryptography: (a Practical Overview) F.-X. Standaert UCL Crypto Group, Universit´ e catholique de Louvain

              Leakage Resilient Cryptography: (a Practical Overview) F.-X. Standaert UCL Crypto Group, Universit´ e catholique de Louvain

              Add to Reading List

              Source URL: skew2011.mat.dtu.dk

              Language: English - Date: 2011-02-16 06:19:32
                139Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process Table of Contents 1. Background 2. Requirements for Submission Packages 2.A Cover Sheet


                Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process Table of Contents 1. Background 2. Requirements for Submission Packages 2.A Cover Sheet


                Add to Reading List

                Source URL: csrc.nist.gov

                Language: English - Date: 2017-02-01 14:36:46
                  140322  Int. J. Applied Cryptography, Vol. 2, No. 4, 2012 Chosen-prefix collisions for MD5 and applications Marc Stevens*

                  322 Int. J. Applied Cryptography, Vol. 2, No. 4, 2012 Chosen-prefix collisions for MD5 and applications Marc Stevens*

                  Add to Reading List

                  Source URL: documents.epfl.ch

                  Language: English - Date: 2012-08-03 05:02:16