Public-key cryptography

Results: 11378



#Item
771Sorting and Searching Behind the Curtain Foteini Baldimtsi1 and Olga Ohrimenko2 1 Boston University, USA and University of Athens, Greece {} 2

Sorting and Searching Behind the Curtain Foteini Baldimtsi1 and Olga Ohrimenko2 1 Boston University, USA and University of Athens, Greece {} 2

Add to Reading List

Source URL: fc15.ifca.ai

Language: English - Date: 2015-01-11 00:33:27
772NIST Interagency Report 7863

NIST Interagency Report 7863

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-06-17 14:09:24
773Hierarchical deterministic Bitcoin wallets that tolerate key leakage (Short paper) Gus Gutoski1 and Douglas Stebila2 1

Hierarchical deterministic Bitcoin wallets that tolerate key leakage (Short paper) Gus Gutoski1 and Douglas Stebila2 1

Add to Reading List

Source URL: fc15.ifca.ai

Language: English - Date: 2015-01-11 00:32:41
774General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps by Pratish Datta joint work with

General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps by Pratish Datta joint work with

Add to Reading List

Source URL: isc2015.item.ntnu.no

Language: English - Date: 2015-09-19 12:55:00
775The Book Review Column1 by William Gasarch Department of Computer Science University of Maryland at College Park College Park, MD, 20742 email:

The Book Review Column1 by William Gasarch Department of Computer Science University of Maryland at College Park College Park, MD, 20742 email:

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2014-06-30 10:38:30
776Associate - Web Analytics Web Analytics Testing Period: June 2015 Setting the standard  Digital Helix

Associate - Web Analytics Web Analytics Testing Period: June 2015 Setting the standard Digital Helix

Add to Reading List

Source URL: www.effectivemeasure.com

Language: English - Date: 2015-08-24 20:50:07
777Comparison of Low-Power Public Key Cryptography on MICAz 8-Bit Micro Controller Leif Uhsadel April 4, 2007

Comparison of Low-Power Public Key Cryptography on MICAz 8-Bit Micro Controller Leif Uhsadel April 4, 2007

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2010-04-20 22:18:49
    778PKC ’16 19th International Conference on Practice and Theory in Public-Key Cryptography CALL FOR PAPERS

    PKC ’16 19th International Conference on Practice and Theory in Public-Key Cryptography CALL FOR PAPERS

    Add to Reading List

    Source URL: troll.iis.sinica.edu.tw

    Language: English - Date: 2016-02-22 01:55:25
      779Peculiar Properties of Lattice-Based Encryption Chris Peikert Georgia Institute of Technology  Public Key Cryptography

      Peculiar Properties of Lattice-Based Encryption Chris Peikert Georgia Institute of Technology Public Key Cryptography

      Add to Reading List

      Source URL: web.eecs.umich.edu

      Language: English - Date: 2015-09-08 16:32:09
        780Public-Key Cryptography from Different Assumptions Benny Applebaum∗ Boaz Barak†  Avi Wigderson‡

        Public-Key Cryptography from Different Assumptions Benny Applebaum∗ Boaz Barak† Avi Wigderson‡

        Add to Reading List

        Source URL: www.eng.tau.ac.il

        Language: English - Date: 2010-10-14 04:05:39