51![CSCI 5440: Cryptography The Chinese University of Hong Kong, SpringLecture 4 CSCI 5440: Cryptography The Chinese University of Hong Kong, SpringLecture 4](https://www.pdfsearch.io/img/f88fe615366527dcbafc0fc42b247511.jpg) | Add to Reading ListSource URL: www.cse.cuhk.edu.hkLanguage: English - Date: 2018-03-06 02:49:38
|
---|
52![Lehrstuhl f¨ur Theoretische Informationstechnik Homework 11 in Cryptography I Prof. Dr. Rudolf Mathar, Wolfgang Meyer zu Bergsten, Michael Reyer Lehrstuhl f¨ur Theoretische Informationstechnik Homework 11 in Cryptography I Prof. Dr. Rudolf Mathar, Wolfgang Meyer zu Bergsten, Michael Reyer](https://www.pdfsearch.io/img/8d6b4b520f71af8862f65fbb89e4af2a.jpg) | Add to Reading ListSource URL: www.ti.rwth-aachen.deLanguage: English - Date: 2009-01-21 01:44:04
|
---|
53![Lehrstuhl f¨ur Theoretische Informationstechnik Homework 12 in Cryptography I Prof. Dr. Rudolf Mathar, Wolfgang Meyer zu Bergsten, Michael Reyer Lehrstuhl f¨ur Theoretische Informationstechnik Homework 12 in Cryptography I Prof. Dr. Rudolf Mathar, Wolfgang Meyer zu Bergsten, Michael Reyer](https://www.pdfsearch.io/img/a63fe694d8bc34ed1bdb86d78bbbf3cc.jpg) | Add to Reading ListSource URL: www.ti.rwth-aachen.deLanguage: English - Date: 2009-02-12 07:23:51
|
---|
54![EIDMA/DIAMANT Cryptography Working Group _______________________________________________________________ Friday, October 1, 2010 Trianon Zalencentrum ( http://www.trianon-zalen.nl/ ) Oudegracht 252, Utrecht EIDMA/DIAMANT Cryptography Working Group _______________________________________________________________ Friday, October 1, 2010 Trianon Zalencentrum ( http://www.trianon-zalen.nl/ ) Oudegracht 252, Utrecht](https://www.pdfsearch.io/img/7808f6f46da83975f55f87581af0fdd0.jpg) | Add to Reading ListSource URL: www.win.tue.nl- Date: 2011-04-06 03:04:08
|
---|
55![Class Group Computations Application to Cryptography Class Group Computations in Number Fields and Applications to Cryptography Alexandre Gélin Class Group Computations Application to Cryptography Class Group Computations in Number Fields and Applications to Cryptography Alexandre Gélin](https://www.pdfsearch.io/img/06532a8bbaf3d1aefda1ee3c1f39f095.jpg) | Add to Reading ListSource URL: jc2-2017.inria.frLanguage: English - Date: 2017-05-09 09:15:37
|
---|
56![Crafting Certified Elliptic Curve Cryptography Implementations in Coq Andres Erbsen Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree o Crafting Certified Elliptic Curve Cryptography Implementations in Coq Andres Erbsen Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree o](https://www.pdfsearch.io/img/c5de70f0a3e402365b50ebacd4d33429.jpg) | Add to Reading ListSource URL: adam.chlipala.netLanguage: English - Date: 2018-02-11 06:46:49
|
---|
57![Public-key cryptography in Tor and pluggable transports Tanja Lange Technische Universiteit Eindhoven 09 June 2016 Public-key cryptography in Tor and pluggable transports Tanja Lange Technische Universiteit Eindhoven 09 June 2016](https://www.pdfsearch.io/img/1c5e504fdfb859dddbede29d9b65ee52.jpg) | Add to Reading ListSource URL: hyperelliptic.orgLanguage: English - Date: 2016-08-28 19:31:14
|
---|
58![Workshop on Real-World Cryptography Stanford University Jan. 9-11, 2013 AES-GCM for Efficient Authenticated Encryption – Ending the Reign of HMAC-SHA-1? Shay Gueron Workshop on Real-World Cryptography Stanford University Jan. 9-11, 2013 AES-GCM for Efficient Authenticated Encryption – Ending the Reign of HMAC-SHA-1? Shay Gueron](https://www.pdfsearch.io/img/730029dab7346012721f14d0b1e568d6.jpg) | Add to Reading ListSource URL: crypto.stanford.eduLanguage: English - Date: 2013-01-15 23:49:06
|
---|
59![Vectorial Boolean Functions for Cryptography Claude Carlet∗ This chapter is dedicated to the memory of Hans Dobbertin. ∗ Vectorial Boolean Functions for Cryptography Claude Carlet∗ This chapter is dedicated to the memory of Hans Dobbertin. ∗](https://www.pdfsearch.io/img/d24d206d8576224076346fc5868bc773.jpg) | Add to Reading ListSource URL: www.math.univ-paris13.frLanguage: English - Date: 2012-10-31 08:46:12
|
---|
60![Cryptography Working Group Cryptography Working Group](https://www.pdfsearch.io/img/e4f921f6f49bdc1aba045c08a3d386b0.jpg) | Add to Reading ListSource URL: www.win.tue.nl- Date: 2012-11-27 07:26:58
|
---|