1![Lower Bounds on Black-Box Ring Extraction Tibor Jager and Andy Rupp , Horst G¨ ortz Institute for IT Security Ruhr-University Bochum, Germany Lower Bounds on Black-Box Ring Extraction Tibor Jager and Andy Rupp , Horst G¨ ortz Institute for IT Security Ruhr-University Bochum, Germany](https://www.pdfsearch.io/img/5e5d06e08193ba8b394556113d6119fe.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2008-11-30 10:17:55
|
---|
2![An Improved Pseudorandom Generator Based on Hardness of Factoring Nenad Dedi´c Boston University An Improved Pseudorandom Generator Based on Hardness of Factoring Nenad Dedi´c Boston University](https://www.pdfsearch.io/img/da2e9461f48359066f0148a526dd0d9c.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2002-08-27 12:28:51
|
---|
3![CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions](https://www.pdfsearch.io/img/cb20301e6ab5775439a19b80b94c23e6.jpg) | Add to Reading ListSource URL: crypto.stanford.eduLanguage: English - Date: 2004-01-05 17:05:04
|
---|
4![CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions](https://www.pdfsearch.io/img/c3cab5ec7afbb7f038105b44e9eaff69.jpg) | Add to Reading ListSource URL: crypto.stanford.eduLanguage: English - Date: 2006-01-11 14:38:17
|
---|
5![CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions](https://www.pdfsearch.io/img/44a322e79f121405c6e0ce3db5cd0312.jpg) | Add to Reading ListSource URL: crypto.stanford.eduLanguage: English - Date: 2003-01-05 20:38:49
|
---|
6![Cryptographic protocols / Diffie–Hellman key exchange / Finite fields / RSA / Euclidean algorithm / Naor-Reingold Pseudorandom Function / Cryptography / Mathematics / Public-key cryptography Cryptographic protocols / Diffie–Hellman key exchange / Finite fields / RSA / Euclidean algorithm / Naor-Reingold Pseudorandom Function / Cryptography / Mathematics / Public-key cryptography](/pdf-icon.png) | Add to Reading ListSource URL: crypto.stanford.eduLanguage: English - Date: 2002-03-21 01:47:16
|
---|
7![CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions](https://www.pdfsearch.io/img/4ba762c8e963b772811ff65c64cd8af7.jpg) | Add to Reading ListSource URL: crypto.stanford.eduLanguage: English - Date: 2005-01-04 13:22:38
|
---|
8![Kleptography: Using Cryptography Against Cryptography Adam Young* and Kleptography: Using Cryptography Against Cryptography Adam Young* and](https://www.pdfsearch.io/img/5defa3ce91a184bf9f623d1c4aecf11d.jpg) | Add to Reading ListSource URL: cryptome.orgLanguage: English - Date: 2013-09-12 07:28:33
|
---|
9![Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants Allison B. Lewko ∗ University of Texas at Austin Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants Allison B. Lewko ∗ University of Texas at Austin](https://www.pdfsearch.io/img/45dfebe6fdc672433052fc7cded9b26e.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2009-10-16 13:57:22
|
---|
10![CS255: Cryptography and Computer Security Winter 2002 CS255: Cryptography and Computer Security Winter 2002](https://www.pdfsearch.io/img/df7249120dcc862fc8edd289fc145286.jpg) | Add to Reading ListSource URL: crypto.stanford.eduLanguage: English - Date: 2007-01-06 01:59:49
|
---|