Group-based cryptography

Results: 52



#Item
41ETSI GS QKD 002 V1[removed]Group Specification Quantum Key Distribution; Use Cases

ETSI GS QKD 002 V1[removed]Group Specification Quantum Key Distribution; Use Cases

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2010-06-04 11:14:44
42ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2010-05-04 11:35:10
43References 1. ABA Bank Card Standard,

References 1. ABA Bank Card Standard, "Management and Use of Personal Information Numbers, " Aids from ABA, Catalog no[removed], American Bankers Association, [removed]ABA Document 4.3, "Key Management Standard," American

Add to Reading List

Source URL: www.ssl.stu.neva.ru

Language: English - Date: 2001-07-17 16:00:00
44Concurrently Secure Identification Schemes based on the Worst-Case Hardness of Lattice Problems ASIACRYPT 2008 Dec. 10

Concurrently Secure Identification Schemes based on the Worst-Case Hardness of Lattice Problems ASIACRYPT 2008 Dec. 10

Add to Reading List

Source URL: xagawa.net

Language: English - Date: 2010-01-23 11:51:04
45

PDF Document

Add to Reading List

Source URL: www.joye.site88.net

Language: English - Date: 2014-05-09 20:15:57
46A Comment on \A New Public{Key Cipher System Based Upon the Diophantine Equations

A Comment on \A New Public{Key Cipher System Based Upon the Diophantine Equations" S.R. Blackburn, S. Murphyyand K.G. Patersonz Information Security Group, Royal Holloway, University of London, Surrey TW20 0EX, U.K.

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-30 04:39:34
47

PDF Document

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2014-05-09 20:15:57
48Modeling TCG-based Secure Systems with Colored Petri Nets? Liang Gu† , Yao Guo†?? , Yanjiang Yang § , Feng Bao§ , Hong Mei† †  Key Laboratory of High Confidence Software Technologies (Ministry of Education),

Modeling TCG-based Secure Systems with Colored Petri Nets? Liang Gu† , Yao Guo†?? , Yanjiang Yang § , Feng Bao§ , Hong Mei† † Key Laboratory of High Confidence Software Technologies (Ministry of Education),

Add to Reading List

Source URL: sei.pku.edu.cn

Language: English - Date: 2010-11-12 00:51:14
49Contemporary Mathematics  Using shifted conjugacy in braid-based cryptography Patrick DEHORNOY Abstract. Conjugacy is not the only possible primitive for designing braidbased protocols. To illustrate this principle, we d

Contemporary Mathematics Using shifted conjugacy in braid-based cryptography Patrick DEHORNOY Abstract. Conjugacy is not the only possible primitive for designing braidbased protocols. To illustrate this principle, we d

Add to Reading List

Source URL: www.math.unicaen.fr

Language: English - Date: 2006-08-29 03:42:11
50Short Signature Scheme From Bilinear Pairings Sedat Akleylek , Barı¸s B¨ ulent Kırlar

Short Signature Scheme From Bilinear Pairings Sedat Akleylek , Barı¸s B¨ ulent Kırlar

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2009-06-09 04:23:16