11![Lattice-based Fault Attacks on DSA - Another Possible Strategy Lattice-based Fault Attacks on DSA - Another Possible Strategy](https://www.pdfsearch.io/img/1f2941bbc4927de5e8b01cba3e8953e3.jpg) | Add to Reading ListSource URL: crypto.hyperlink.czLanguage: English - Date: 2005-08-29 10:42:00
|
---|
12![Cryptographic Insecurity of the Test&Repeat Paradigm Cryptographic Insecurity of the Test&Repeat Paradigm](https://www.pdfsearch.io/img/93b1d6145eb7bc9416989061b2d23ba8.jpg) | Add to Reading ListSource URL: crypto.hyperlink.czLanguage: English - Date: 2005-08-29 10:42:00
|
---|
13![CS255: Cryptography and Computer Security Winter 2004 Final Exam Instructions CS255: Cryptography and Computer Security Winter 2004 Final Exam Instructions](https://www.pdfsearch.io/img/1111d7aeb267e0b440ea49814bd4066d.jpg) | Add to Reading ListSource URL: crypto.stanford.eduLanguage: English - Date: 2005-03-01 20:32:14
|
---|
14![A Signature Scheme as Secure as the Diffie-Hellman Problem Eu-Jin Goh and StanisÃlaw Jarecki Computer Science Department, Stanford University, Stanford CA[removed]removed], [removed] A Signature Scheme as Secure as the Diffie-Hellman Problem Eu-Jin Goh and StanisÃlaw Jarecki Computer Science Department, Stanford University, Stanford CA[removed]removed], [removed]](https://www.pdfsearch.io/img/66a27630390fa96331b2e3ae50b5e366.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2008-09-15 00:54:52
|
---|
15![The Elliptic Curve Digital Signature Algorithm (ECDSA) The Elliptic Curve Digital Signature Algorithm (ECDSA) ](https://www.pdfsearch.io/img/6c9c73bad97bf69888e287544a784a7d.jpg) | Add to Reading ListSource URL: cs.ucsb.eduLanguage: English - Date: 2009-10-15 20:03:40
|
---|
16![PSS is Secure against Random Fault Attacks Jean-S´ebastien Coron and Avradip Mandal University of Luxembourg Abstract. A fault attack consists in inducing hardware malfunctions in order to recover secrets from electroni PSS is Secure against Random Fault Attacks Jean-S´ebastien Coron and Avradip Mandal University of Luxembourg Abstract. A fault attack consists in inducing hardware malfunctions in order to recover secrets from electroni](https://www.pdfsearch.io/img/89b9c1e5a1b1dc2e6a44f0e1b1c68545.jpg) | Add to Reading ListSource URL: www.jscoron.frLanguage: English - Date: 2014-12-02 03:11:30
|
---|
17![Efficient One-time Proxy Signatures Huaxiong Wang and Josef Pieprzyk Centre for Advanced Computing – Algorithms and Cryptography Department of Computing Macquarie University Sydney, NSW 2109, AUSTRALIA Efficient One-time Proxy Signatures Huaxiong Wang and Josef Pieprzyk Centre for Advanced Computing – Algorithms and Cryptography Department of Computing Macquarie University Sydney, NSW 2109, AUSTRALIA](https://www.pdfsearch.io/img/adcff06589298dd8b572f0588a987e5d.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2008-09-15 00:54:54
|
---|
18![An extended abstract of this work appeared in: Public-Key Cryptography – Proceedings of PKC ’07 (April 16–[removed], Beijing, China) T. Okamoto and X. Wang Eds. Springer-Verlag, LNCS 4450, pages 217–232. Improved O An extended abstract of this work appeared in: Public-Key Cryptography – Proceedings of PKC ’07 (April 16–[removed], Beijing, China) T. Okamoto and X. Wang Eds. Springer-Verlag, LNCS 4450, pages 217–232. Improved O](https://www.pdfsearch.io/img/7f09b51ebcc88634f909db2caab4e6eb.jpg) | Add to Reading ListSource URL: www.ssi.gouv.frLanguage: English - Date: 2012-11-06 05:29:18
|
---|
19![A Study on Lattice-Based Public-Key Cryptosystems 05M37122 Keita Xagawa Supervisor: Keisuke Tanaka Department of Mathematical and Computing Sciences Tokyo Institute of Technology A Study on Lattice-Based Public-Key Cryptosystems 05M37122 Keita Xagawa Supervisor: Keisuke Tanaka Department of Mathematical and Computing Sciences Tokyo Institute of Technology](https://www.pdfsearch.io/img/155fcb2200b92803c5e8d513e59b12cb.jpg) | Add to Reading ListSource URL: xagawa.netLanguage: English - Date: 2010-01-23 11:51:00
|
---|
20![Fully Self-Organized Peer-to-Peer Key Management for Mobile Ad Hoc Networks Johann van der Merwe Dawoud Dawoud Fully Self-Organized Peer-to-Peer Key Management for Mobile Ad Hoc Networks Johann van der Merwe Dawoud Dawoud](https://www.pdfsearch.io/img/5e730c2c567a8346560f037d1c21059b.jpg) | Add to Reading ListSource URL: johannvandermerwe.co.zaLanguage: English - Date: 2013-06-28 06:17:54
|
---|