Cryptography

Results: 21893



#Item
161Cryptography / Digital signature / Probabilistic encryption / Public-key cryptography / RSA / Block cipher / Claw-free permutation / Mihir Bellare / Plaintext-aware encryption / Semantic security / One-way function / Hard-core predicate

Lecture Notes on Cryptography Shafi Goldwasser1 Mihir Bellare2 July 2008

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2008-07-22 14:58:27
162

S TANDARDS FOR E FFICIENT C RYPTOGRAPHY SEC 1: Elliptic Curve Cryptography Certicom Research Contact:

Add to Reading List

Source URL: www.secg.org

Language: English - Date: 2015-01-29 09:45:12
    163

    Financial Cryptography and Data Security ’09 13th International Conference Accra Beach, Barbados February 23-26, 2009 http://fc09.ifca.ai Overview

    Add to Reading List

    Source URL: fc09.ifca.ai

    Language: English - Date: 2008-12-12 12:15:50
      164

      Memory-hard functions and tradeoff cryptanalysis with applications to password hashing, cryptocurrencies, and white-box cryptography

      Add to Reading List

      Source URL: www.cryptolux.org

      Language: English - Date: 2014-09-01 07:09:04
        165

        Cryptography Working Group

        Add to Reading List

        Source URL: www.win.tue.nl

        Language: English - Date: 2015-05-19 03:15:03
          166

          Code-Based Zero-Knowledge Proofs, Signatures and More Kirill Morozov UNT 6th Code-Based Cryptography Workshop (CBCDavie, Florida, USA

          Add to Reading List

          Source URL: www.math.fau.edu

          Language: English - Date: 2018-04-08 14:51:17
            167

            This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

            Add to Reading List

            Source URL: cacr.uwaterloo.ca

            Language: English - Date: 2011-07-10 02:35:13
              168

              PQCRYPTO – Post-Quantum Cryptography for Long-term Security Tanja Lange 01 May 2015 Intel Workshop: International View of the

              Add to Reading List

              Source URL: pqcrypto.eu.org

              Language: English - Date: 2016-03-13 11:15:02
                169

                CS255: Cryptography and Computer Security Winter 2008 Final Exam Instructions

                Add to Reading List

                Source URL: crypto.stanford.edu

                Language: English - Date: 2008-03-21 14:11:27
                  170

                  Current Quantum Cryptography Algorithm Is Optimal: A Proof 1st Oscar Galindo 2 Vladik Kreinovich nd

                  Add to Reading List

                  Source URL: www.cs.utep.edu

                  Language: English - Date: 2018-05-26 11:55:30
                    UPDATE