PKC

Results: 114



#Item
11This is the Full Version of the Extended Abstract that appears in the Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’February – 1 March 2013, Nara, Ja

This is the Full Version of the Extended Abstract that appears in the Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’February – 1 March 2013, Nara, Ja

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-02-21 09:51:42
1215th IACR International Conference on Practice and Theory in Public Key Cryptography PKC 2012 Darmstadt, May 21-23, 2012 Conference Program

15th IACR International Conference on Practice and Theory in Public Key Cryptography PKC 2012 Darmstadt, May 21-23, 2012 Conference Program

Add to Reading List

Source URL: pkc2012.cased.de

Language: English - Date: 2012-05-15 13:55:28
    13This is the Full Version of the Extended Abstract that appears in the Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’February – 1 March 2013, Nara, Ja

    This is the Full Version of the Extended Abstract that appears in the Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’February – 1 March 2013, Nara, Ja

    Add to Reading List

    Source URL: www.normalesup.org

    Language: English - Date: 2015-02-21 09:51:42
    14v7 PKC - MVZ Kompass.indd

    v7 PKC - MVZ Kompass.indd

    Add to Reading List

    Source URL: www.nhochdrei.de

    Language: German - Date: 2012-12-19 08:40:50
      15In C.-M. Cheng et al., Eds., Public Key Cryptography − PKC 2016, Part I, volof Lecture Notes in Computer Science, pp, Springer, 2016. Identity-Based Cryptosystems and Quadratic Residuosity Marc Joye

      In C.-M. Cheng et al., Eds., Public Key Cryptography − PKC 2016, Part I, volof Lecture Notes in Computer Science, pp, Springer, 2016. Identity-Based Cryptosystems and Quadratic Residuosity Marc Joye

      Add to Reading List

      Source URL: joye.site88.net

      Language: English - Date: 2016-02-23 20:14:59
        16RESEARCH ARTICLE CANCER EGFR Signals to mTOR Through PKC and Independently of Akt in Glioma Qi-Wen Fan,1,2,3,4 Christine Cheng,1,2,3,4 Zachary A. Knight,5,6,7

        RESEARCH ARTICLE CANCER EGFR Signals to mTOR Through PKC and Independently of Akt in Glioma Qi-Wen Fan,1,2,3,4 Christine Cheng,1,2,3,4 Zachary A. Knight,5,6,7

        Add to Reading List

        Source URL: knightlab.ucsf.edu

        Language: English - Date: 2013-08-14 14:38:05
          17IWSEC 2013 Preliminary announcement Security Conferences in Japan Feb. PKC@Nara

          IWSEC 2013 Preliminary announcement Security Conferences in Japan Feb. PKC@Nara

          Add to Reading List

          Source URL: cis.sjtu.edu.cn

          Language: English - Date: 2012-12-10 09:59:39
            18NARA, Japan, Feb. 26-Mar. 1, 2013 Program Chair: Kaoru Kurosawa General Chair: Goichiro Hanaoka http://ohta-lab.jp/pkc2013/  PKC Locations

            NARA, Japan, Feb. 26-Mar. 1, 2013 Program Chair: Kaoru Kurosawa General Chair: Goichiro Hanaoka http://ohta-lab.jp/pkc2013/ PKC Locations

            Add to Reading List

            Source URL: cis.sjtu.edu.cn

            Language: English - Date: 2012-12-10 09:59:40
              19— An extended abstract of this work appears in the proceedings of PKC 2012 —  From Selective to Full Security: Semi-Generic Transformations in the Standard Model Michel Abdalla1 1

              — An extended abstract of this work appears in the proceedings of PKC 2012 — From Selective to Full Security: Semi-Generic Transformations in the Standard Model Michel Abdalla1 1

              Add to Reading List

              Source URL: www.di.ens.fr

              Language: English - Date: 2012-07-10 04:55:32
                20PKC ’16 19th International Conference on Practice and Theory in Public-Key Cryptography CALL FOR PAPERS

                PKC ’16 19th International Conference on Practice and Theory in Public-Key Cryptography CALL FOR PAPERS

                Add to Reading List

                Source URL: troll.iis.sinica.edu.tw

                Language: English - Date: 2016-02-22 01:55:25