111![References [1] M. Agrawal, N. Kayal, and N. Saxena. PRIMES is in P. Ann. of Math. (2), 160(2):781–793, [removed]L. V. Ahlfors. Complex Analysis. McGraw-Hill Book Co., New York, third edition, 1978. An introduction to References [1] M. Agrawal, N. Kayal, and N. Saxena. PRIMES is in P. Ann. of Math. (2), 160(2):781–793, [removed]L. V. Ahlfors. Complex Analysis. McGraw-Hill Book Co., New York, third edition, 1978. An introduction to](https://www.pdfsearch.io/img/1c6a7170329431accf067f26a9694561.jpg) | Add to Reading ListSource URL: www.math.brown.eduLanguage: English - Date: 2008-03-20 11:42:48
|
---|
112![Preface The creation of public key cryptography by Diffie and Hellman in 1976 and the subsequent invention of the RSA public key cryptosystem by Rivest, Shamir, and Adleman in 1978 are watershed events in the long histor Preface The creation of public key cryptography by Diffie and Hellman in 1976 and the subsequent invention of the RSA public key cryptosystem by Rivest, Shamir, and Adleman in 1978 are watershed events in the long histor](https://www.pdfsearch.io/img/2a60dbc3fd6f0ab501ba6e10b5f5a64e.jpg) | Add to Reading ListSource URL: www.math.brown.eduLanguage: English - Date: 2008-03-20 11:45:18
|
---|
113![Post-Quantum Cryptography Tanja Lange Technische Universiteit Eindhoven [removed] 17 December 2008 Post-Quantum Cryptography Tanja Lange Technische Universiteit Eindhoven [removed] 17 December 2008](https://www.pdfsearch.io/img/eee635a572d992dcc76bbe65ad217ecd.jpg) | Add to Reading ListSource URL: hyperelliptic.orgLanguage: English - Date: 2009-01-22 19:45:07
|
---|
114![Implementação do Criptossistema Pós-Quântico NTRU conforme a Norma IEEE[removed]Cassius de Oliveira Puodzius1 , Paulo S. L. M. Barreto1∗ Implementação do Criptossistema Pós-Quântico NTRU conforme a Norma IEEE[removed]Cassius de Oliveira Puodzius1 , Paulo S. L. M. Barreto1∗](https://www.pdfsearch.io/img/552eaf2e5c3b7e7430899e9c707889bb.jpg) | Add to Reading ListSource URL: www.redes.unb.brLanguage: Portuguese - Date: 2013-02-20 07:53:15
|
---|
115![Making NTRU as Secure as Worst-Case Problems over Ideal Lattices Damien Stehlé1 and Ron Steinfeld2 Making NTRU as Secure as Worst-Case Problems over Ideal Lattices Damien Stehlé1 and Ron Steinfeld2](https://www.pdfsearch.io/img/b3aed45cc4a0171e98f1fc693db80dc9.jpg) | Add to Reading ListSource URL: perso.ens-lyon.frLanguage: English - Date: 2011-02-24 04:40:45
|
---|
116![](https://www.pdfsearch.io/img/462bf8dfd7a980520b8d96bce0c3d0b4.jpg) | Add to Reading ListSource URL: www.szydlo.comLanguage: English - Date: 2011-04-23 07:41:21
|
---|
117![](https://www.pdfsearch.io/img/a42ac8e7d0ef1a1c19cf0b6930598b1e.jpg) | Add to Reading ListSource URL: middleware.internet2.eduLanguage: English - Date: 2009-04-08 18:56:03
|
---|
118![](https://www.pdfsearch.io/img/7cf8c2f3d0731c47c5c9eca43a671a28.jpg) | Add to Reading ListSource URL: www.di.ens.frLanguage: English - Date: 2012-09-14 07:56:30
|
---|
119![](https://www.pdfsearch.io/img/3464996ea5bc67b159604f66d3fc2737.jpg) | Add to Reading ListSource URL: grouper.ieee.orgLanguage: English - Date: 2008-04-27 09:53:40
|
---|
120![](https://www.pdfsearch.io/img/a07bb256e42b6164755a0ea8fceae548.jpg) | Add to Reading ListSource URL: homes.esat.kuleuven.beLanguage: English - Date: 2011-08-26 10:46:04
|
---|