Cryptography

Results: 21893



#Item
211

Algorithmic number theory and cryptography — Team presentation, Bordeaux Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest

Add to Reading List

Source URL: www.normalesup.org

- Date: 2014-08-21 15:44:55
    212

    Standardization of post-quantum cryptography Tanja Lange 08 May 2016 A Workshop About Cryptographic Standards

    Add to Reading List

    Source URL: www.cryptoexperts.com

    - Date: 2016-05-30 09:49:30
      213

      Robust Authenticated Encryption and the Limits of Symmetric Cryptography? Christian Badertscher1 , Christian Matt1 , Ueli Maurer1 , Phillip Rogaway2 , and Björn Tackmann3 1

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2015-09-14 09:48:53
        214

        Summary of the Theory Component of Quantum Key Distribution and Quantum Cryptography

        Add to Reading List

        Source URL: qist.lanl.gov

        - Date: 2004-07-27 17:15:26
          215

          The SANDstorm Hash Mark Torgerson and Richard Schroeppel Tim Draelos, Nathan Dautenhahn, Sean Malone, Andrea Walker, Michael Collins, Hilarie Orman* Cryptography and Information Systems Surety Department Sandia National

          Add to Reading List

          Source URL: www.seantmalone.com

          - Date: 2012-12-15 16:15:09
            216

            Algorithms of discrete logarithm in finite fields Razvan Barbulescu To cite this version: Razvan Barbulescu. Algorithms of discrete logarithm in finite fields. Cryptography and Security [cs.CR]. Universit´e de Lorraine,

            Add to Reading List

            Source URL: tel.archives-ouvertes.fr

            - Date: 2016-07-14 20:58:49
              217

              MATHEMATICS 4440 SPRING 2014 CODING AND CRYPTOGRAPHY Instructor: Katherine Stange

              Add to Reading List

              Source URL: math.colorado.edu

              - Date: 2015-10-18 16:52:38
                218

                Microsoft Word - Modulhandbuch-MI-cryptography-2012.doc

                Add to Reading List

                Source URL: cosec.bit.uni-bonn.de

                - Date: 2014-02-03 06:03:57
                  219

                  On a generalized Gross-Zagier formula and applications to genus 2 curves in cryptography Kristin Lauter, Microsoft Research Joint work with: Bianca Viray, Brown University

                  Add to Reading List

                  Source URL: www.cosic.esat.kuleuven.be

                  - Date: 2013-09-19 10:39:02
                    220

                    Fast Cryptography in Genus 2 Joppe W. Bos Joint work with Craig Costello, Huseyin Hisil, Kristin Lauter

                    Add to Reading List

                    Source URL: www.cosic.esat.kuleuven.be

                    - Date: 2013-09-19 10:38:53
                      UPDATE