51![I’m sending you on NESSIE discussion forum our paper about analysis of implementation of HIEROCRYPT-3 and CAMELLIA algorithms I’m sending you on NESSIE discussion forum our paper about analysis of implementation of HIEROCRYPT-3 and CAMELLIA algorithms](https://www.pdfsearch.io/img/01189f1e16e55ddb9b534e8cf98a9f10.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2003-12-17 08:53:09
|
---|
52![New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman Abstract Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman Abstract Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to](https://www.pdfsearch.io/img/582ec2afec6a2f4a81619d825cb99c23.jpg) | Add to Reading ListSource URL: www.cs.tau.ac.ilLanguage: English - Date: 2001-12-26 10:46:32
|
---|
53![ABC - A New Framework for Block Ciphers Uri Avraham1? Eli Biham1? Orr Dunkelman2 ABC - A New Framework for Block Ciphers Uri Avraham1? Eli Biham1? Orr Dunkelman2](https://www.pdfsearch.io/img/0c61ab6f45bf2fb26f43be90940cc283.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2011-07-29 09:57:15
|
---|
54![Appears in , Vol. 61, No. 3, Dec 2000, pp. 362{399. Preliminary version was in 94 , Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994. Appears in , Vol. 61, No. 3, Dec 2000, pp. 362{399. Preliminary version was in 94 , Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.](https://www.pdfsearch.io/img/f0f75093ba4feaab9f9f5e97eab92e3b.jpg) | Add to Reading ListSource URL: cseweb.ucsd.eduLanguage: English - Date: 2001-09-12 12:24:34
|
---|
55![Single-bit Re-encryption with Applications to Distributed Proof Systems Nikita Borisov Kazuhiro Minami Single-bit Re-encryption with Applications to Distributed Proof Systems Nikita Borisov Kazuhiro Minami](https://www.pdfsearch.io/img/d33eb08109a18427674df099d4afa5b0.jpg) | Add to Reading ListSource URL: systemsresilience.orgLanguage: English - Date: 2013-01-05 00:32:20
|
---|
56![Cryptography is Important to the Public Interest This is a joint letter to the UN Special Rapporteur on Freedom of Expression from the undersigned non-governmental organizations in response to his January 2015 request fo Cryptography is Important to the Public Interest This is a joint letter to the UN Special Rapporteur on Freedom of Expression from the undersigned non-governmental organizations in response to his January 2015 request fo](https://www.pdfsearch.io/img/b977b0d81e3134183d618540df960ae8.jpg) | Add to Reading ListSource URL: www.ohchr.orgLanguage: English - Date: 2015-03-16 11:04:21
|
---|
57![International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January[removed]ENCRYPTION OF DATA USING ELLIPTIC CURVE OVER FINITE FIELDS D. Sravana Kumar1 1 International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January[removed]ENCRYPTION OF DATA USING ELLIPTIC CURVE OVER FINITE FIELDS D. Sravana Kumar1 1](https://www.pdfsearch.io/img/621c624f025bd3f3032c0c6c7efd603c.jpg) | Add to Reading ListSource URL: arxiv.orgLanguage: English - Date: 2012-02-09 20:01:10
|
---|
58![F-Response Now Cloud Service Privacy and Security Summary PRIVACY AND SECURITY SUMMARY PRIVACY F-Response Now instances (“Now Instances”) leverage a number of design decisions to greatly reduce or eliminate the pote F-Response Now Cloud Service Privacy and Security Summary PRIVACY AND SECURITY SUMMARY PRIVACY F-Response Now instances (“Now Instances”) leverage a number of design decisions to greatly reduce or eliminate the pote](https://www.pdfsearch.io/img/a2f174a2001514ca446ca31f4c66753b.jpg) | Add to Reading ListSource URL: www.f-response.comLanguage: English - Date: 2014-11-03 13:25:55
|
---|
59![Communication & Network Security DigiSAFE LinkCrypt Reliable and Transparent Link Security Communication & Network Security DigiSAFE LinkCrypt Reliable and Transparent Link Security](https://www.pdfsearch.io/img/eb4068be855fe1a414f7bd11a1540423.jpg) | Add to Reading ListSource URL: www.digisafe.comLanguage: English - Date: 2014-10-24 02:05:31
|
---|
60![V GUIDE Table of Contents Preface Program Committee V GUIDE Table of Contents Preface Program Committee](https://www.pdfsearch.io/img/8ace2538ed5465e18bcc7d0b4d2ff19d.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2006-01-16 14:16:27
|
---|