11![This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. Homomorphic This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. Homomorphic](https://www.pdfsearch.io/img/331d3307054bf930fbd84f3b1f001be2.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2017-02-03 04:27:06
|
---|
12![ECE/CS498: Applied Cryptography Instructor: Andrew Miller, TA: Kevin Liao Lecture 3: More Interactive Proofs 1 ECE/CS498: Applied Cryptography Instructor: Andrew Miller, TA: Kevin Liao Lecture 3: More Interactive Proofs 1](https://www.pdfsearch.io/img/1413f807ad136827856066546c47a35d.jpg) | Add to Reading ListSource URL: gitlab-beta.engr.illinois.eduLanguage: English |
---|
13![Practical Post-Quantum Cryptography for Trusted Computing Matthias J. Kannwischer, PhD Student Workshop on Trusted Computing and its Applications 25 January 2018 Practical Post-Quantum Cryptography for Trusted Computing Matthias J. Kannwischer, PhD Student Workshop on Trusted Computing and its Applications 25 January 2018](https://www.pdfsearch.io/img/ed408f8423c0767f8e0e23bb7988ffac.jpg) | Add to Reading ListSource URL: kannwischer.euLanguage: English - Date: 2018-04-02 10:21:47
|
---|
14![This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,](https://www.pdfsearch.io/img/fcc137ca595747ab916326658de9ded4.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2017-12-13 06:49:27
|
---|
15![Flexible Models for Secure Systems Sarah Meiklejohn
A creation story Motivating scenario that founded modern cryptography: Flexible Models for Secure Systems Sarah Meiklejohn
A creation story Motivating scenario that founded modern cryptography:](https://www.pdfsearch.io/img/8ded68e805b4da28672d5aabda01007b.jpg) | Add to Reading ListSource URL: smeiklej.comLanguage: English - Date: 2018-10-23 14:58:02
|
---|
16![Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography Alfred Menezes1 , Palash Sarkar2 , and Shashank Singh3 1 Department of Combinatorics & Optimization, University of Water Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography Alfred Menezes1 , Palash Sarkar2 , and Shashank Singh3 1 Department of Combinatorics & Optimization, University of Water](https://www.pdfsearch.io/img/a218f9e8fd29d9fd6f8fe57f2f010b17.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2016-12-27 11:29:50
|
---|
17![Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai1 , Tancrède Lepoint3 , Adeline Roux-Langlois4 , Amin Sakzad5 , Damien Stehlé2 , and Ron S Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai1 , Tancrède Lepoint3 , Adeline Roux-Langlois4 , Amin Sakzad5 , Damien Stehlé2 , and Ron S](https://www.pdfsearch.io/img/18ec19dafb1052c468792588215884eb.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2018-02-25 03:26:11
|
---|
18![Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R](https://www.pdfsearch.io/img/b74c740213775c41b50ef0ecc432184c.jpg) | Add to Reading ListSource URL: www.ofirweisse.comLanguage: English - Date: 2018-10-17 09:19:20
|
---|
19![Lehrstuhl f¨ur Theoretische Informationstechnik Homework 2 in Cryptography I Prof. Dr. Rudolf Mathar, Wolfgang Meyer zu Bergsten, Michael Reyer Lehrstuhl f¨ur Theoretische Informationstechnik Homework 2 in Cryptography I Prof. Dr. Rudolf Mathar, Wolfgang Meyer zu Bergsten, Michael Reyer](https://www.pdfsearch.io/img/f22d180733a678e05a6821dc147604d5.jpg) | Add to Reading ListSource URL: www.ti.rwth-aachen.deLanguage: English - Date: 2008-10-27 08:57:25
|
---|