Cryptology

Results: 302



#Item
61Computer algebra / Algebraic geometry / Polynomials / Algebra / Commutative algebra / Grbner basis / Monomial order / System of polynomial equations / Resultant / Monomial / Lexicographical order / Jean-Charles Faugre

Solving efficiently structured polynomial systems and Applications in Cryptology Jean-Charles Faugère Joint work with: L. Huot

Add to Reading List

Source URL: ecc2011.loria.fr

Language: English - Date: 2011-09-30 12:40:03
62

Mastermath Spring 2015 Exam Cryptology Course Tuesday, 30 JuneName

Add to Reading List

Source URL: hyperelliptic.org

Language: English - Date: 2015-08-29 20:22:43
    63

    A First-Year Seminar in Cryptology “The Art and Science of Secret Writing” Rob Beezer Department of Mathematics and Computer Science

    Add to Reading List

    Source URL: buzzard.ups.edu

    Language: English - Date: 2011-01-02 16:18:25
      64

      Automatic Search for Differential Trails in ARX Ciphers (extended version) Alex Biryukov and Vesselin Velichkov Laboratory of Algorithmics, Cryptology and Security (LACS) University of Luxembourg {Alex.Biryukov,Vesselin.

      Add to Reading List

      Source URL: www.cryptolux.org

      Language: English - Date: 2014-06-30 09:32:34
        65

        Practical Chosen Ciphertext Secure Encryption from Factoring Dennis Hofheinz? and Eike Kiltz?? Cryptology & Information Security Group CWI Amsterdam, The Netherlands {hofheinz,kiltz}@cwi.nl

        Add to Reading List

        Source URL: www.kjdf.de

        Language: English - Date: 2014-06-10 05:37:34
          66

          Mastermath course: Cryptology, Spring 2015 Examples of exercises Here is what the exam will say as a foreword. This set of exercises is much more than 3h worth of work. Make sure to justify your answers in detail and to

          Add to Reading List

          Source URL: hyperelliptic.org

          Language: English - Date: 2015-05-20 23:50:09
            67

            A preliminary version of this paper appears in Advances in Cryptology – CRYPTO ’07, Lecture Notes in Computer Science Vol. 4622, A. Menezes ed., Springer-Verlag, 2007. This is the full version. Secure Hybrid Encrypti

            Add to Reading List

            Source URL: www.kjdf.de

            Language: English - Date: 2014-06-10 05:37:37
              68

              Romanian Cryptology Days, RCD-2015 September 21-23, 2015, Bucharest, Romania Romanian Academy Library CONFERENCE AGENDA Monday, September 21th , 2015

              Add to Reading List

              Source URL: www.sie.ro

              Language: English - Date: 2015-09-21 01:42:00
                69

                A preliminary version of this paper appeared in: T. Ristenpart, H. Shacham, and T. Shrimpton. Careful with Composition: Limitations of the Indifferentiability Framework. Advances in Cryptology – EUROCRYPT ’11, LNCS v

                Add to Reading List

                Source URL: cseweb.ucsd.edu

                Language: English - Date: 2012-09-28 13:55:56
                  70

                  TSpecial Course on Cryptology November 25th, 2004 Algebraic Attacks and Stream Ciphers Mikko Kiviharju Helsinki University of Technology

                  Add to Reading List

                  Source URL: www.tcs.hut.fi

                  Language: English - Date: 2005-01-18 09:05:25
                    UPDATE