Public-key cryptography

Results: 11378



#Item
781E-th roots and static Diffie-Hellman using index calculus Antoine Joux1 Joint work with Reynald Lercier2 , David Naccache3 , Emmanuel Thome´ 4  Elliptic Curve Cryptography 2008

E-th roots and static Diffie-Hellman using index calculus Antoine Joux1 Joint work with Reynald Lercier2 , David Naccache3 , Emmanuel Thome´ 4 Elliptic Curve Cryptography 2008

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-10-04 13:47:14
782Certicom AMI 7000 data sheet-front-rev10

Certicom AMI 7000 data sheet-front-rev10

Add to Reading List

Source URL: www.certicom.com

Language: English - Date: 2009-06-02 19:28:55
783State of Illinois Department of Human Services CHILD CARE TELEPHONE BILLING AGREEMENT  Please complete this form and return to your Child Care Resource and Referral

State of Illinois Department of Human Services CHILD CARE TELEPHONE BILLING AGREEMENT Please complete this form and return to your Child Care Resource and Referral

Add to Reading List

Source URL: ccrs.illinois.edu

Language: English - Date: 2016-01-27 14:01:59
784This is the full version0 of the extended abstract which appears in the 2011 International Conference on Theory and Practice in Public Key Cryptography PKC–9 march 2011, Taormina, Italy) D. Catalano, N. Fazio,

This is the full version0 of the extended abstract which appears in the 2011 International Conference on Theory and Practice in Public Key Cryptography PKC–9 march 2011, Taormina, Italy) D. Catalano, N. Fazio,

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2011-07-13 07:40:09
    785Post Quantum Cryptography: Implementing Alternative Public Key Schemes on Embedded Devices

    Post Quantum Cryptography: Implementing Alternative Public Key Schemes on Embedded Devices

    Add to Reading List

    Source URL: www.emsec.rub.de

    Language: English - Date: 2014-03-28 10:00:16
      786CryptoNote v 2.0 Nicolas van Saberhagen October 17, 2013 1

      CryptoNote v 2.0 Nicolas van Saberhagen October 17, 2013 1

      Add to Reading List

      Source URL: cryptonote.org

      Language: English
      787Constructing abelian varieties for cryptographic use Peter Stevenhagen ECC, Utrecht September 22, 2008

      Constructing abelian varieties for cryptographic use Peter Stevenhagen ECC, Utrecht September 22, 2008

      Add to Reading List

      Source URL: www.hyperelliptic.org

      Language: English - Date: 2008-10-05 20:16:07
      788Ruhr-University Bochum  Post Quantum Cryptography on Embedded Devices: An Ecient Implementation of the McEliece Public Key Scheme based on

      Ruhr-University Bochum Post Quantum Cryptography on Embedded Devices: An Ecient Implementation of the McEliece Public Key Scheme based on

      Add to Reading List

      Source URL: www.emsec.rub.de

      Language: English - Date: 2012-10-11 02:29:54
        789Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal Qiang Tang

        Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal Qiang Tang

        Add to Reading List

        Source URL: isc2015.item.ntnu.no

        Language: English - Date: 2015-09-20 14:16:36
        790Interfaces for Personal Identity Verification

        Interfaces for Personal Identity Verification

        Add to Reading List

        Source URL: nvlpubs.nist.gov

        Language: English - Date: 2016-02-16 14:47:45