Cryptol

Results: 12



#Item
1

Microsoft PowerPoint - cryptol_nextWavefig234--kprewit.ppt [Compatibility Mode]

Add to Reading List

Source URL: cryptol.net

- Date: 2018-01-18 19:58:41
    2Complexity classes / Cryptography / Computational complexity theory / Proof of knowledge / IP / Quantum complexity theory / Soundness / NP / Commitment scheme / PSPACE / PP / Security parameter

    J. Cryptol: 116–135 DOI: s00145x Parallel Repetition of Computationally Sound Protocols Revisited∗ Krzysztof Pietrzak

    Add to Reading List

    Source URL: www.nada.kth.se

    Language: English - Date: 2012-05-30 09:00:34
    3

    Microsoft PowerPoint - cryptol_nextWavefig234--kprewit.ppt [Compatibility Mode]

    Add to Reading List

    Source URL: www.cryptol.net

    Language: English - Date: 2016-01-19 20:56:27
      4

      Cryptol: The Language of Cryptography Domain Specific Languages A path to high assurance solutions CASE STUDY

      Add to Reading List

      Source URL: www.cryptol.net

      Language: English - Date: 2016-01-19 20:56:27
        5

        PDF Document

        Add to Reading List

        Source URL: www.cryptol.net

        Language: English - Date: 2016-01-19 20:56:27
          6

          Microsoft PowerPoint - cryptol_nextWavefig234--kprewit.ppt [Compatibility Mode]

          Add to Reading List

          Source URL: cryptol.net

          Language: English - Date: 2016-01-19 20:56:27
            7

            Programming in Cryptol2: A Tutorial Cryptol:

            Add to Reading List

            Source URL: www.cryptol.net

            Language: English - Date: 2016-01-19 20:56:27
              8Hardware description languages / Electronic design / Field-programmable gate array / VHDL / Application-specific integrated circuit / Integrated circuit design / Electronic engineering / Electronics / Integrated circuits

              Hardware/Software Co-verification of Cryptographic Algorithms using Cryptol Levent Erkök, Magnus Carlsson, Adam Wick November 18th, 2009 FMCAD’09, Austin TX

              Add to Reading List

              Source URL: fmv.jku.at

              Language: English - Date: 2010-02-08 09:22:27
              9Block cipher / Message authentication codes / Disk encryption theory / Mercy / Initialization vector / Advantage / Feistel cipher / Cipher / CBC-MAC / Cryptography / Block cipher modes of operation / Block ciphers

              J. Cryptol[removed]: 588–613 DOI: [removed]s00145[removed]y Tweakable Block Ciphers Moses Liskov Computer Science Department, The College of William and Mary, Williamsburg, VA 23187, USA

              Add to Reading List

              Source URL: www.cs.berkeley.edu

              Language: English - Date: 2015-01-21 19:48:40
              10IP / Message authentication code / NP / Cryptography / Public-key cryptography / Digital signature

              J. Cryptol[removed]: 310–348 DOI: [removed]s00145[removed]Multi-Verifier Signatures∗ Tom Roeder† Microsoft Research, Redmond, USA

              Add to Reading List

              Source URL: www.cs.cornell.edu

              Language: English - Date: 2013-03-16 18:26:36
              UPDATE