41![Public Key Infrastructure PKI Michael Maass and Blase Ur 1 Public Key Infrastructure PKI Michael Maass and Blase Ur 1](https://www.pdfsearch.io/img/f11b51330a7e10949891354ca13da5a5.jpg) | Add to Reading ListSource URL: cups.cs.cmu.eduLanguage: English - Date: 2011-10-25 17:46:07
|
---|
42![Nippon Telegraph and Telephone Corporation Mitsubishi Electric Corporation New Authenticated Encryption Algorithm Features Robust Resistance to Multiple Misuse TOKYO, March 17, 2014 – Nippon Telegraph and Telephone Cor Nippon Telegraph and Telephone Corporation Mitsubishi Electric Corporation New Authenticated Encryption Algorithm Features Robust Resistance to Multiple Misuse TOKYO, March 17, 2014 – Nippon Telegraph and Telephone Cor](https://www.pdfsearch.io/img/59680251e72f63c013b1f963a79f6472.jpg) | Add to Reading ListSource URL: www.mitsubishielectric.comLanguage: English - Date: 2015-02-03 21:03:02
|
---|
43![A Certified E-Mail Protocol Bruce Schneier Counterpane Systems James Riordan A Certified E-Mail Protocol Bruce Schneier Counterpane Systems James Riordan](https://www.pdfsearch.io/img/e0d705c5d958c16c04d22ccb0f8dfc08.jpg) | Add to Reading ListSource URL: www.schneier.comLanguage: English - Date: 2014-03-02 23:18:30
|
---|
44![A new security proof for Damg˚ ard’s ElGamal Kristian Gjøsteen March 17, 2005 Abstract A new security proof for Damg˚ ard’s ElGamal Kristian Gjøsteen March 17, 2005 Abstract](https://www.pdfsearch.io/img/bee2c7327cc1fe2f5bb9dbfabeb7db67.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2005-03-17 15:37:01
|
---|
45![Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias∗ Moti Yung† Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing Aggelos Kiayias∗ Moti Yung†](https://www.pdfsearch.io/img/bb58402a3916d6c0283c9410d6ba5620.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2006-12-04 09:17:42
|
---|
46![Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea](https://www.pdfsearch.io/img/65e4f36ac52c7953bb76fafe77a3e8fa.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2006-12-24 08:27:19
|
---|
47![Some Observations on SHAMATA Ewan Fleischmann and Michael Gorski Bauhaus-University Weimar, Germany {Ewan.Fleischman, Michael.Gorski}@uni-weimar.de Abstract. In this note we discuss some observation of the SHA-3 candida Some Observations on SHAMATA Ewan Fleischmann and Michael Gorski Bauhaus-University Weimar, Germany {Ewan.Fleischman, Michael.Gorski}@uni-weimar.de Abstract. In this note we discuss some observation of the SHA-3 candida](https://www.pdfsearch.io/img/b5ee532386111e247719d61039046da3.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2008-11-27 07:11:39
|
---|
48![A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates Pei-yih Ting and Po-Yueh Hung Department of Computer Science, National Taiwan Ocean University {pyting, m92570002}@mail.ntou.edu.tw A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates Pei-yih Ting and Po-Yueh Hung Department of Computer Science, National Taiwan Ocean University {pyting, m92570002}@mail.ntou.edu.tw](https://www.pdfsearch.io/img/15d4a81f21d790f2df47c62f0a08015d.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2004-12-04 01:29:08
|
---|
49![COFFE: Ciphertext Output Feedback Faithful Encryption On-Line Authenticated Encryption Without a Block Cipher Christian Forler1⋆ , David McGrew2 , Stefan Lucks1 , and Jakob Wenzel1 1 Bauhaus-University Weimar, Germany COFFE: Ciphertext Output Feedback Faithful Encryption On-Line Authenticated Encryption Without a Block Cipher Christian Forler1⋆ , David McGrew2 , Stefan Lucks1 , and Jakob Wenzel1 1 Bauhaus-University Weimar, Germany](https://www.pdfsearch.io/img/d0d64c27857c5c670f10133eb71bc75e.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2014-12-17 05:30:49
|
---|
50![Do We Need to Vary the Constants? Methodological Investigation of Block-Cipher Based Hash Functions Donghoon Chang1 and Moti Yung2 1 Do We Need to Vary the Constants? Methodological Investigation of Block-Cipher Based Hash Functions Donghoon Chang1 and Moti Yung2 1](https://www.pdfsearch.io/img/859a07d2eb81342650656a92e680e9af.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2006-12-11 13:21:29
|
---|