41![ETSI GS QKD 002 V1[removed]Group Specification Quantum Key Distribution; Use Cases ETSI GS QKD 002 V1[removed]Group Specification Quantum Key Distribution; Use Cases](https://www.pdfsearch.io/img/fc11fb3fde839cbe73ea5a2a23c4cb66.jpg) | Add to Reading ListSource URL: www.etsi.orgLanguage: English - Date: 2010-06-04 11:14:44
|
---|
42![ECRYPT II ICT[removed]ECRYPT II European Network of Excellence in Cryptology II ECRYPT II ICT[removed]ECRYPT II European Network of Excellence in Cryptology II](https://www.pdfsearch.io/img/9a69d3f5b59a276ee51f8d975f6b2198.jpg) | Add to Reading ListSource URL: www.ecrypt.eu.orgLanguage: English - Date: 2010-05-04 11:35:10
|
---|
43![References 1. ABA Bank Card Standard, References 1. ABA Bank Card Standard,](https://www.pdfsearch.io/img/8ff17500b14e348f08f69f474bee507d.jpg) | Add to Reading ListSource URL: www.ssl.stu.neva.ruLanguage: English - Date: 2001-07-17 16:00:00
|
---|
44![Concurrently Secure Identification Schemes based on the Worst-Case Hardness of Lattice Problems ASIACRYPT 2008 Dec. 10 Concurrently Secure Identification Schemes based on the Worst-Case Hardness of Lattice Problems ASIACRYPT 2008 Dec. 10](https://www.pdfsearch.io/img/4edef4bb0bd363a7a5373a8ff7683e30.jpg) | Add to Reading ListSource URL: xagawa.netLanguage: English - Date: 2010-01-23 11:51:04
|
---|
45![](https://www.pdfsearch.io/img/48eaecfd76dcb4e34eca9178056640d7.jpg) | Add to Reading ListSource URL: www.joye.site88.netLanguage: English - Date: 2014-05-09 20:15:57
|
---|
46![A Comment on \A New Public{Key Cipher System Based Upon the Diophantine Equations A Comment on \A New Public{Key Cipher System Based Upon the Diophantine Equations](https://www.pdfsearch.io/img/a24a05118dd0fc4ec8c2313f36d31abb.jpg) | Add to Reading ListSource URL: www.isg.rhul.ac.ukLanguage: English - Date: 2005-11-30 04:39:34
|
---|
47![](https://www.pdfsearch.io/img/63a0372fe89b5852e02034666258b378.jpg) | Add to Reading ListSource URL: joye.site88.netLanguage: English - Date: 2014-05-09 20:15:57
|
---|
48![Modeling TCG-based Secure Systems with Colored Petri Nets? Liang Gu† , Yao Guo†?? , Yanjiang Yang § , Feng Bao§ , Hong Mei† † Key Laboratory of High Confidence Software Technologies (Ministry of Education), Modeling TCG-based Secure Systems with Colored Petri Nets? Liang Gu† , Yao Guo†?? , Yanjiang Yang § , Feng Bao§ , Hong Mei† † Key Laboratory of High Confidence Software Technologies (Ministry of Education),](https://www.pdfsearch.io/img/dc02af9b77c8185d1fef36d2ae973f86.jpg) | Add to Reading ListSource URL: sei.pku.edu.cnLanguage: English - Date: 2010-11-12 00:51:14
|
---|
49![Contemporary Mathematics Using shifted conjugacy in braid-based cryptography Patrick DEHORNOY Abstract. Conjugacy is not the only possible primitive for designing braidbased protocols. To illustrate this principle, we d Contemporary Mathematics Using shifted conjugacy in braid-based cryptography Patrick DEHORNOY Abstract. Conjugacy is not the only possible primitive for designing braidbased protocols. To illustrate this principle, we d](https://www.pdfsearch.io/img/c187e4ed2ed57962aaa83f539594844d.jpg) | Add to Reading ListSource URL: www.math.unicaen.frLanguage: English - Date: 2006-08-29 03:42:11
|
---|
50![Short Signature Scheme From Bilinear Pairings Sedat Akleylek , Barı¸s B¨ ulent Kırlar Short Signature Scheme From Bilinear Pairings Sedat Akleylek , Barı¸s B¨ ulent Kırlar](https://www.pdfsearch.io/img/e0a1593a8dd8f0d97f94667e0f15f4b2.jpg) | Add to Reading ListSource URL: events.iaik.tugraz.atLanguage: English - Date: 2009-06-09 04:23:16
|
---|