Eprint

Results: 2085



#Item
701

サポートプリンターリスト iPad/ iPhone/ iPod touch/ Android アプリケーション ePrint 2015 年 05 月 19 日

Add to Reading List

Source URL: www.e-workshop-dev.com

Language: English - Date: 2015-05-19 00:17:01
    702

    A Note on the Soundness in Bare Public-Key Model

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2001-12-17 22:10:32
      703

      Fine grain Cross-VM Attacks on Xen and VMware are possible! Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar ∗ Worcester Polytechnic Institute {girazoki,msinci,teisenbarth,sunar}@wpi.edu Abst

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2014-04-07 18:32:56
        704

        Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-03-03 03:54:29
          705

          Kampagnenauftakt – Vorstellung der HP ePrint-Funktion HP EPRINT IM PRAXISTEST Kampagnenfinale – Gewinnerreportage mit Video und Bildergalerie

          Add to Reading List

          Source URL: www.chip-media.de

          Language: German - Date: 2011-07-21 09:58:22
            706

            Accountable Certificate Management using Undeniable Attestations Ahto Buldas Peeter Laud

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2000-08-22 09:56:36
              707

              Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack Ronald Cramer Dept. of Computer Science, Aarhus University

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2001-12-17 07:56:45
                708

                Key recovery attacks on NTRU without ciphertext validation routine Daewan Han, Jin Hong, Jae Woo Han, and Daesung Kwon National Security Research Institute, 161 Gajeong-dong, Yuseong-gu, Daejeon, , KOREA dwh,jinho

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2003-04-18 23:20:42
                  709

                  What number r of different IVs, and what keystream sequence length l, do we need before this technique can be applied enoug...

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2001-12-10 04:48:31
                    710

                    Quasi-Efficient Revocation of Group Signatures Giuseppe Ateniese1 , Dawn Song2 , and Gene Tsudik3 1 Department of Computer Science The Johns Hopkins University, Baltimore, MD. USA

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    Language: English - Date: 2002-04-01 19:10:52
                      UPDATE