Cryptography

Results: 21893



#Item
171

Post-quantum key exchange for the TLS protocol from R-LWE Craig Costello MSR-T Security and Cryptography Group joint work with Joppe Bos (NXP), Michael Naehrig (MSR), Douglas Stebila (QUT)

Add to Reading List

Source URL: www.craigcostello.com.au

Language: English - Date: 2014-10-29 23:31:25
    172

    Some Recent Uses of Stern-like Protocols in Lattice-Based Cryptography Khoa Nguyen, Nanyang Technological University Quantum-Safe Crypto Workshop, CQT, NUS October, 3rd, 2016

    Add to Reading List

    Source URL: quantum-safe-crypto.quantumlah.org

    - Date: 2016-10-04 03:16:29
      173

      Threshold Cryptography Tuesday, October 24, :29 PM

      Add to Reading List

      Source URL: soc1024.ece.illinois.edu

      - Date: 2017-10-31 15:28:17
        174

        Colleen M. Swanson travellingcryptographer.com • Research Interests Computer security and applied cryptography, privacy-enhancing technologies, security/privacy-related public policy, i

        Add to Reading List

        Source URL: travellingcryptographer.com

        - Date: 2017-10-03 15:50:40
          175

          Vis-`a-vis Cryptography: Private and Trustworthy In-Person Certifications Ian Miers∗ Matthew Green∗ Christoph U. Lehmann, MD†

          Add to Reading List

          Source URL: cs.jhu.edu

          - Date: 2016-03-20 19:13:38
            176

            1 CONTENT 1 Cryptography Overview

            Add to Reading List

            Source URL: wanchain.org

            - Date: 2018-01-10 05:19:10
              177

              This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. Homomorphic

              Add to Reading List

              Source URL: fc17.ifca.ai

              - Date: 2017-03-17 11:53:43
                178

                Raspberry Pi Secure messaging Cryptography: One Time Pad Nate Drake explains how your Pi can bring you to the very pinnacle of

                Add to Reading List

                Source URL: s3.amazonaws.com

                - Date: 2017-01-27 05:11:24
                  179

                  Cryptographic Extraction and Key Derivation: The HKDF Scheme Hugo Krawczyk∗ Abstract In spite of the central role of key derivation functions (KDF) in applied cryptography, there

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2010-05-10 19:09:23
                    180

                    w w w . c r y s y s . h u Introducing the CrySyS Lab Levente Buttyán, PhD Laboratory of Cryptography and Systems Security Department of Networked Systems and Services

                    Add to Reading List

                    Source URL: www.crysys.hu

                    - Date: 2018-01-31 02:12:17
                      UPDATE