Public-key cryptography

Results: 11378



#Item
971No.: CE/ADMUNIVERSITY OF CALCUTTA Senate House Kolkata

No.: CE/ADMUNIVERSITY OF CALCUTTA Senate House Kolkata

Add to Reading List

Source URL: www.caluniv.ac.in

Language: English - Date: 2014-03-28 04:42:28
972How to encrypt your form before sending it to us for processing (Ubuntu version) Note - All strings with this formatting are to be entered in a terminal window. Step 1 – Install GPG Download and install gpg if it is no

How to encrypt your form before sending it to us for processing (Ubuntu version) Note - All strings with this formatting are to be entered in a terminal window. Step 1 – Install GPG Download and install gpg if it is no

Add to Reading List

Source URL: cgi2013.welfenlab.de

Language: English - Date: 2014-08-14 09:32:51
973Public Key Cryptography How mathematics allows us to send our most secret messages quite openly without revealing their contents except only to those who are supposed to read them

Public Key Cryptography How mathematics allows us to send our most secret messages quite openly without revealing their contents except only to those who are supposed to read them

Add to Reading List

Source URL: www.cleavebooks.co.uk

- Date: 2007-05-13 18:30:35
    9746.045J Lecture 14: Public-key cryptography

    6.045J Lecture 14: Public-key cryptography

    Add to Reading List

    Source URL: ocw.mit.edu

    Language: English - Date: 2015-05-24 22:10:44
      975The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

      The development of Public Key Cryptography a personal view Ralph C. Merkle Georgia Tech College of Computing

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2011-06-15 12:21:53
        976Graceful Service Degradation (or, How to Know your Payment is Late) ∗ Alexandr Andoni MIT

        Graceful Service Degradation (or, How to Know your Payment is Late) ∗ Alexandr Andoni MIT

        Add to Reading List

        Source URL: www.mit.edu

        Language: English - Date: 2005-06-07 15:30:07
        977CS 161  Computer Security Fall 2005

        CS 161 Computer Security Fall 2005

        Add to Reading List

        Source URL: www-inst.eecs.berkeley.edu

        Language: English - Date: 2005-12-13 23:10:13
        978Office of Controller of Certification Rajan Raj Pant Controller Government of Nepal

        Office of Controller of Certification Rajan Raj Pant Controller Government of Nepal

        Add to Reading List

        Source URL: www.cca.gov.np

        Language: English - Date: 2014-06-01 07:03:56
        979Secure Multiparty Computations on Bitcoin Marcin Andrychowicz, Stefan Dziembowski∗ , Daniel Malinowski, Łukasz Mazurek University of Warsaw, Poland {marcin.andrychowicz, stefan.dziembowski, daniel.malinowski, lukasz.m

        Secure Multiparty Computations on Bitcoin Marcin Andrychowicz, Stefan Dziembowski∗ , Daniel Malinowski, Łukasz Mazurek University of Warsaw, Poland {marcin.andrychowicz, stefan.dziembowski, daniel.malinowski, lukasz.m

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2014-04-21 13:48:10
        980draft-irtf-cfrg-xmss-hash-based-signatures-00 - XMSS: Extended Hash-Based Signatures

        draft-irtf-cfrg-xmss-hash-based-signatures-00 - XMSS: Extended Hash-Based Signatures

        Add to Reading List

        Source URL: tools.ietf.org

        Language: English - Date: 2015-04-08 10:22:54