Cryptography

Results: 21893



#Item
201

Trustworthy, High Performance Cryptography on Embedded Multi-core Systems

Add to Reading List

Source URL: csrc.nist.gov

- Date: 2012-05-31 09:24:26
    202

    暗号論入門 (Cryptography) 授業科目名 担当教員名

    Add to Reading List

    Source URL: www.sci.shizuoka.ac.jp

    - Date: 2016-10-31 08:31:55
      203

      Cryptography I, homework sheet 12 Due: 8 January 2015, 10:45 Team up in groups of two or three to hand in your homework. We do not have capacity to correct all homeworks individually. To submit your homework, email it to

      Add to Reading List

      Source URL: hyperelliptic.org

      - Date: 2014-12-18 16:29:33
        204

        Noname manuscript No. (will be inserted by the editor) Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2015-04-24 16:50:14
          205

          FROM CROSSBOWS TO CRYPTOGRAPHY: THWARTING THE STATE VIA TECHNOLOGY CHUCK HAMMILL The following is the text of a talk given by Chuck Hammill to the Future of Freedom Conference, in Culver

          Add to Reading List

          Source URL: www.libertarian.co.uk

          - Date: 2014-10-22 06:33:30
            206

            10th International View of the State-of-the-Art of Cryptography and Security and its Use in Practice Friday, December 9th, 2016 9am-5pm Venue: Intercontinental Hanoi Westlake. Please follow signs to the meeting room. Reg

            Add to Reading List

            Source URL: www.asiacrypt2016.org

            - Date: 2016-12-03 18:53:57
              207

              Formal Verification of Cryptography (I) -- Introduction to basic concepts in cryptography Yusuke Kawamoto INRIA Saclay & LIX, École Polytechnique, France In University of Tokyo

              Add to Reading List

              Source URL: www.cs.bham.ac.uk

              - Date: 2014-05-18 16:48:57
                208

                Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography Aniket Kate Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2010-07-23 17:06:12
                  209

                  International Journal of Network Security, Vol.18, No.2, PP, MarA Lightweight RFID Security Protocol Based on Elliptic Curve Cryptography

                  Add to Reading List

                  Source URL: ijns.jalaxy.com.tw

                  - Date: 2015-07-25 23:03:43
                    210

                    International View of the State-of-theArt of Cryptography and Security and its Use in Practice (VIII) Friday December 4 Venue: University of Auckland Participation: Please contact Claire Vishik ()

                    Add to Reading List

                    Source URL: www.math.auckland.ac.nz

                    - Date: 2015-10-14 17:02:01
                      UPDATE