Cryptography

Results: 21893



#Item
181

Puzzling Cryptography Codes and ciphers are forms of secret communication. A code replaces letters, words, or phrases with different letters or numbers. A cipher rearranges letters or uses substitute symbols to disguise

Add to Reading List

Source URL: www.wackenhammer.com

- Date: 2017-12-04 23:43:07
    182

    An Introduction to Elliptic Curve Cryptography Tanner Prynn Elliptic Curves The Discrete Logarithm Problem

    Add to Reading List

    Source URL: tannerprynn.com

    - Date: 2016-11-15 21:24:42
      183

      Bitcoin Private  March 16, 2018 The Bitcoin Private foundation is awarding a series of grants of up to $150,000 for research in areas of cryptography and network security that further our goals of enhancing and democrat

      Add to Reading List

      Source URL: btcprivate.org

      - Date: 2018-04-03 14:16:22
        184

        Business Meeting 7th International Conference on Quantum Cryptography QCrypt 2017 Sept 18-22, 2017 Cambridge, UK

        Add to Reading List

        Source URL: 2017.qcrypt.net

        - Date: 2017-09-27 01:52:53
          185

          Bachelor Thesis Quantum Cryptography Petra Pajic

          Add to Reading List

          Source URL: homepage.univie.ac.at

          - Date: 2013-11-19 16:38:01
            186

            Quantum Cryptography J. Aditya, P. Shankar Rao {Dept of CSE, Andhra University} Email: {adityajami,techmaster4u}@gmail.com ABSTRACT Modern cryptography algorithms are based over the fundamental process of factoring large

            Add to Reading List

            Source URL: cs.stanford.edu

            - Date: 2014-12-07 23:53:04
              187

              Int. J. of Applied Cryptography, Vol. 2, No. 4, Chosen-prefix collisions for MD5 and applications Marc Stevens

              Add to Reading List

              Source URL: marc-stevens.nl

              - Date: 2017-08-13 07:48:58
                188

                a Course in Cryptography rafael pass abhi shelat

                Add to Reading List

                Source URL: www.cs.cornell.edu

                - Date: 2010-08-26 11:46:13
                  189

                  Chapter 17 Lattice Basis Reduction This is a chapter from version 1.1 of the book “Mathematics of Public Key Cryptography” by Steven Galbraith, available from http://www.isg.rhul.ac.uk/˜sdg/crypto-book/ The copyrig

                  Add to Reading List

                  Source URL: www.math.auckland.ac.nz

                  - Date: 2014-01-05 18:06:58
                    190

                    Cutting-Edge Cryptography Through the Lens of Secret Sharing Ilan Komargodski ∗ Mark Zhandry

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2015-10-21 02:18:42
                      UPDATE