1![Rank-metric Attack on the Edon-K Key Encapsulation Mechanism Matthieu Lequesne1,2 and Jean-Pierre Tillich2 April 5, Sorbonne Université Paris Rank-metric Attack on the Edon-K Key Encapsulation Mechanism Matthieu Lequesne1,2 and Jean-Pierre Tillich2 April 5, Sorbonne Université Paris](https://www.pdfsearch.io/img/56c7e0b62c62b8eb00c9209a45a40853.jpg) | Add to Reading ListSource URL: www.math.fau.eduLanguage: English - Date: 2018-04-06 11:47:56
|
---|
2![Supersingular Isogeny Key Encapsulation Reza Azarderakhsh, Matthew Campagna, Craig Costello, Luca De Feo, Basil Hess, David Jao, Brian Koziel, Brian LaMacchia, Patrick Longa, Michael Naehrig, Joost Renes, Vladimir Soukha Supersingular Isogeny Key Encapsulation Reza Azarderakhsh, Matthew Campagna, Craig Costello, Luca De Feo, Basil Hess, David Jao, Brian Koziel, Brian LaMacchia, Patrick Longa, Michael Naehrig, Joost Renes, Vladimir Soukha](https://www.pdfsearch.io/img/bb2e31f356beebd60d5ef79aae32b824.jpg) | Add to Reading ListSource URL: www.craigcostello.com.auLanguage: English - Date: 2018-01-08 19:41:33
|
---|
3![FrodoKEM Learning With Errors Key Encapsulation Algorithm Specifications And Supporting Documentation November 30, FrodoKEM Learning With Errors Key Encapsulation Algorithm Specifications And Supporting Documentation November 30,](https://www.pdfsearch.io/img/9c235cefe44481079142bd430272ef99.jpg) | Add to Reading ListSource URL: frodokem.org- Date: 2017-12-17 17:28:41
|
---|
4![CS 161 Computer Security Spring 2010 CS 161 Computer Security Spring 2010](https://www.pdfsearch.io/img/85a7d7d85bc98318ddd0f305c8cc6845.jpg) | Add to Reading ListSource URL: www-inst.eecs.berkeley.eduLanguage: English - Date: 2010-04-03 00:22:05
|
---|
5![SOA Security What is challenging? Construction SOA Security What is challenging? Construction](https://www.pdfsearch.io/img/0cdf98280f74a8aa3ec403c39ed175cd.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2015-04-09 10:28:09
|
---|
6![Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India](https://www.pdfsearch.io/img/47a66a7221e7f98f5dbc273b40bb43c1.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-04-19 14:57:29
|
---|
7![Limitations of Data Encapsulation and Abstract Data Types Paul L. Bergstein University of Massachusetts Dartmouth Abstract One of the key benefits provided by object-oriented Limitations of Data Encapsulation and Abstract Data Types Paul L. Bergstein University of Massachusetts Dartmouth Abstract One of the key benefits provided by object-oriented](https://www.pdfsearch.io/img/2ac42ac4245f33e663ecbcb0968f4bdb.jpg) | Add to Reading ListSource URL: www.cis.umassd.eduLanguage: English - Date: 2000-08-29 17:06:26
|
---|
8![Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement Dario Fiore1? , Rosario Gennaro2 , and Nigel P. Smart3 ´ Ecole Normale Sup´erieure, Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement Dario Fiore1? , Rosario Gennaro2 , and Nigel P. Smart3 ´ Ecole Normale Sup´erieure,](https://www.pdfsearch.io/img/87d4a2222c94aa8f41d06119a786f7cd.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2010-08-30 11:15:58
|
---|
9![Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex](https://www.pdfsearch.io/img/35b5573a57a377bf574f322413f7751d.jpg) | Add to Reading ListSource URL: www.bmoeller.deLanguage: English - Date: 2006-01-02 00:25:23
|
---|
10![Authenticated Key Exchange and Key Encapsulation Without Random Oracles Tatsuaki Okamoto NTT, Midori-cho, Musashino-shi, Tokyo, Japan December 26, 2007 Authenticated Key Exchange and Key Encapsulation Without Random Oracles Tatsuaki Okamoto NTT, Midori-cho, Musashino-shi, Tokyo, Japan December 26, 2007](https://www.pdfsearch.io/img/1046d7b5ace5876cea29c0f8d4f660d6.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2007-12-26 03:18:35
|
---|