Group-based cryptography

Results: 52



#Item
1Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2014-08-03 16:15:38
2Abelian varieties, Theta functions and cryptography MSR presentation Damien Robert1 1

Abelian varieties, Theta functions and cryptography MSR presentation Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2013-11-15 16:58:00
3Abelian varieties, theta functions and cryptography Part 2 Damien Robert1 1

Abelian varieties, theta functions and cryptography Part 2 Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2013-11-15 16:58:00
4Exercises on pairings on elliptic curves Andreas Enge Leuven, Friday, 13 September 2013 Exercise 1 (Weil reciprocity). Let E : Y 2 = X 3 + X over F7 , f = Y , g = X−1 X−3 . Compute div f and div g, and verify that f

Exercises on pairings on elliptic curves Andreas Enge Leuven, Friday, 13 September 2013 Exercise 1 (Weil reciprocity). Let E : Y 2 = X 3 + X over F7 , f = Y , g = X−1 X−3 . Compute div f and div g, and verify that f

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-09-23 05:41:31
5Where Have You Been? Using Location-Based Security Questions for Fallback Authentication Alina Hang Media Informatics Group University of Munich (LMU)

Where Have You Been? Using Location-Based Security Questions for Fallback Authentication Alina Hang Media Informatics Group University of Munich (LMU)

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:55
6Bilinear Pairings in Cryptography Master thesis #603 by

Bilinear Pairings in Cryptography Master thesis #603 by

Add to Reading List

Source URL: www.math.ru.nl

Language: English - Date: 2009-07-13 10:25:27
7Solving the Data Security Dilemma with Self-Encrypting Drives May 2010 Trusted Computing Group 3855 SW 153rd Drive, Beaverton, OR 97006

Solving the Data Security Dilemma with Self-Encrypting Drives May 2010 Trusted Computing Group 3855 SW 153rd Drive, Beaverton, OR 97006

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2010-05-19 15:06:35
8Identity-Based Cryptography for Grid Security Hoon Wei Lim and Kenneth G. Paterson Information Security Group Royal Holloway, University of London Egham, Surrey TW20 0EX, UK {h.lim, kenny.paterson}@rhul.ac.uk

Identity-Based Cryptography for Grid Security Hoon Wei Lim and Kenneth G. Paterson Information Security Group Royal Holloway, University of London Egham, Surrey TW20 0EX, UK {h.lim, kenny.paterson}@rhul.ac.uk

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-09-30 07:23:50
9PAMINA: A Certificate Based Privilege Management System Zoltán Nochta, Peter Ebinger and Sebastian Abeck University of Karlsruhe, Institute for Telematics, Cooperation and Management IT-Research Group Zirkel 2, 76128 Ka

PAMINA: A Certificate Based Privilege Management System Zoltán Nochta, Peter Ebinger and Sebastian Abeck University of Karlsruhe, Institute for Telematics, Cooperation and Management IT-Research Group Zirkel 2, 76128 Ka

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:36:07