11![Analysis of CAESAR candidates Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation Analysis of CAESAR candidates Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation](https://www.pdfsearch.io/img/35de942d3bc549511c45a1400b75f40b.jpg) | Add to Reading ListSource URL: www.iaik.tugraz.atLanguage: English - Date: 2015-11-30 11:00:03
|
---|
12![- Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua. - Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.](https://www.pdfsearch.io/img/5ee12255aa948f824f3eff7993f3c1e3.jpg) | Add to Reading ListSource URL: security-lab.jaist.ac.jpLanguage: English - Date: 2015-11-09 21:16:55
|
---|
13![Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading? Peter Gaˇzi1,2 and Stefano Tessaro3,4 1 Department of Computer Science, Comenius University, Bratislava, Slovakia Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading? Peter Gaˇzi1,2 and Stefano Tessaro3,4 1 Department of Computer Science, Comenius University, Bratislava, Slovakia](https://www.pdfsearch.io/img/7e370f6a8dc322ea21bfeda93bdb5162.jpg) | Add to Reading ListSource URL: pub.ist.ac.atLanguage: English - Date: 2014-06-19 17:26:59
|
---|
14![Cryptographic Voting: A Tutorial Ben Adida 12 February 2005 Cryptographic Voting: A Tutorial Ben Adida 12 February 2005](https://www.pdfsearch.io/img/4e698d9c2139e3b0866073a845859bf9.jpg) | Add to Reading ListSource URL: assets.adida.netLanguage: English - Date: 2011-04-11 17:40:14
|
---|
15![](https://www.pdfsearch.io/img/553455badc017d64d9e63f4de84ca5f3.jpg) | Add to Reading ListSource URL: seclab.stanford.eduLanguage: English - Date: 2010-07-17 01:14:13
|
---|
16![Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1 University of Maryland Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1 University of Maryland](https://www.pdfsearch.io/img/5c6ec927c90397f80acab4c3f77269ed.jpg) | Add to Reading ListSource URL: www.cs.umd.eduLanguage: English - Date: 2009-09-07 10:57:44
|
---|
17![Microsoft Word - nljul2005_2_.doc Microsoft Word - nljul2005_2_.doc](https://www.pdfsearch.io/img/6049e7574f87c8a7fd9de1f2c0c930ed.jpg) | Add to Reading ListSource URL: www.barc.gov.inLanguage: English - Date: 2012-08-10 06:17:36
|
---|
18![A SYMMETRIC KEY ENCRYPTION ALGORITHM MULTI-S01 A SYMMETRIC-KEY ENCRYPTION ALGORITHM: A SYMMETRIC KEY ENCRYPTION ALGORITHM MULTI-S01 A SYMMETRIC-KEY ENCRYPTION ALGORITHM:](https://www.pdfsearch.io/img/3054679d91576505c463c80fb7ebb861.jpg) | Add to Reading ListSource URL: www.cryptrec.go.jpLanguage: English - Date: 2012-06-28 04:48:45
|
---|
19![Security I – exercises Markus Kuhn Lent 2013 – Part IB 1 Security I – exercises Markus Kuhn Lent 2013 – Part IB 1](https://www.pdfsearch.io/img/26a86e66398627968a225aeea8ae287b.jpg) | Add to Reading ListSource URL: www.cl.cam.ac.ukLanguage: English - Date: 2013-02-04 12:37:29
|
---|
20![Security I – exercises Markus Kuhn Lent 2014 – CST Part IB 1 Security I – exercises Markus Kuhn Lent 2014 – CST Part IB 1](https://www.pdfsearch.io/img/ddf289b7bd07a0b4f5dfd427fb33c8d6.jpg) | Add to Reading ListSource URL: www.cl.cam.ac.ukLanguage: English - Date: 2014-04-22 13:24:19
|
---|