<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Password-authenticated key agreement / Eurocrypt / International Cryptology Conference / Asiacrypt / Digital signature / RSA
Date: 2016-06-01 09:22:58
Cryptography
Public-key cryptography
Password-authenticated key agreement
Eurocrypt
International Cryptology Conference
Asiacrypt
Digital signature
RSA

Fabrice Ben Hamouda--Guichoux Í 1 B rue du Pont RoyalBagneux, France

Add to Reading List

Source URL: www.normalesup.org

Download Document from Source Website

File Size: 283,81 KB

Share Document on Facebook

Similar Documents

A simple and compact algorithm for  SIDH with arbitrary degree isogenies Craig Costello and Huseyin Hisil December 5, 2017 ASIACRYPT

A simple and compact algorithm for SIDH with arbitrary degree isogenies Craig Costello and Huseyin Hisil December 5, 2017 ASIACRYPT

DocID: 1viBg - View Document

Towards Robust Computation on Encrypted Data Manoj Prabhakaran & Mike Rosulek ASIACRYPT 2008 December 9, 2008

Towards Robust Computation on Encrypted Data Manoj Prabhakaran & Mike Rosulek ASIACRYPT 2008 December 9, 2008

DocID: 1vaui - View Document

Improved Information Set Decoding Decoding Random Linear Codes in O(20.054n) Alexander May, Alexander Meurer, Enrico Thomae ASIACRYPT 2011, Seoul  HORST GÖRTZ INSTITUTE FOR IT-SECURITY

Improved Information Set Decoding Decoding Random Linear Codes in O(20.054n) Alexander May, Alexander Meurer, Enrico Thomae ASIACRYPT 2011, Seoul HORST GÖRTZ INSTITUTE FOR IT-SECURITY

DocID: 1v41Y - View Document

Asiacrypt 2015 Rump SessionArgon2 for passwords and everything else Alex Biryukov; Dmitry KhovratovichEgalitarian Computing  Alex Biryukov; Dmitry Khovratovich

Asiacrypt 2015 Rump SessionArgon2 for passwords and everything else Alex Biryukov; Dmitry KhovratovichEgalitarian Computing Alex Biryukov; Dmitry Khovratovich

DocID: 1umqL - View Document

A preliminary version of this paper appears in Advances in Cryptology – ASIACRYPT ’09, Lecture Notes in Computer Science Vol. 5912, pp. 232–249, Mitsuru Matsui ed., Springer-Verlag, 2009. This is the full version.

A preliminary version of this paper appears in Advances in Cryptology – ASIACRYPT ’09, Lecture Notes in Computer Science Vol. 5912, pp. 232–249, Mitsuru Matsui ed., Springer-Verlag, 2009. This is the full version.

DocID: 1taFD - View Document