1![-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1 University of Cincinnati and Technische Universität Darmstadt -Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1 University of Cincinnati and Technische Universität Darmstadt](https://www.pdfsearch.io/img/a8216c1d38b57ce5d7a9c15248f5e68e.jpg) | Add to Reading ListSource URL: precision.moscito.orgLanguage: English - Date: 2011-03-20 04:03:42
|
---|
2![Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3 Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3](https://www.pdfsearch.io/img/888ab6bdbdddef265e1c7cc25cb4d848.jpg) | Add to Reading ListSource URL: precision.moscito.orgLanguage: English - Date: 2012-04-04 23:26:12
|
---|
3![Multivariate Public Key Cryptography Jintai Ding 1 2 Multivariate Public Key Cryptography Jintai Ding 1 2](https://www.pdfsearch.io/img/f318839730a62432c3da08f0a7670589.jpg) | Add to Reading ListSource URL: precision.moscito.orgLanguage: English - Date: 2013-03-10 22:42:02
|
---|
4![This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,](https://www.pdfsearch.io/img/fcc137ca595747ab916326658de9ded4.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2017-12-13 06:49:27
|
---|
5![Why Johnny the Developer Can’t Work with Public Key Certificates? An Experimental Study of OpenSSL Usability Martin Ukrop[0000−0001−8110−8926] and Vashek Matyas Centre for Research on Cryptography and Security Fa Why Johnny the Developer Can’t Work with Public Key Certificates? An Experimental Study of OpenSSL Usability Martin Ukrop[0000−0001−8110−8926] and Vashek Matyas Centre for Research on Cryptography and Security Fa](https://www.pdfsearch.io/img/3f5bdf3eabb99f33f8897946688e2fe5.jpg) | Add to Reading ListSource URL: crocs.fi.muni.czLanguage: English - Date: 2018-04-25 10:30:18
|
---|
6![Public-key cryptography in Tor and pluggable transports Tanja Lange Technische Universiteit Eindhoven 09 June 2016 Public-key cryptography in Tor and pluggable transports Tanja Lange Technische Universiteit Eindhoven 09 June 2016](https://www.pdfsearch.io/img/1c5e504fdfb859dddbede29d9b65ee52.jpg) | Add to Reading ListSource URL: hyperelliptic.orgLanguage: English - Date: 2016-08-28 19:31:14
|
---|
7![by @bascule ELLIPTIC CURVE CRYPTOGRAPHY Public-key cryptography based on elliptic curves is gradually replacing RSA thanks to faster implementations and smaller key sizes. by @bascule ELLIPTIC CURVE CRYPTOGRAPHY Public-key cryptography based on elliptic curves is gradually replacing RSA thanks to faster implementations and smaller key sizes.](https://www.pdfsearch.io/img/80cdddca7380b313169a1e3d02e4befc.jpg) | Add to Reading ListSource URL: fails.orgLanguage: English - Date: 2015-10-01 12:32:52
|
---|
8![Chapter 8: Basic Cryptography • Classical Cryptography • Public Key Cryptography • Cryptographic Checksums November 1, 2004 Chapter 8: Basic Cryptography • Classical Cryptography • Public Key Cryptography • Cryptographic Checksums November 1, 2004](https://www.pdfsearch.io/img/96700b940f34d83ae63cc7c62a28a5af.jpg) | Add to Reading ListSource URL: nob.cs.ucdavis.eduLanguage: English - Date: 2004-11-01 01:20:26
|
---|
9![Chapter 17 Lattice Basis Reduction This is a chapter from version 1.1 of the book “Mathematics of Public Key Cryptography” by Steven Galbraith, available from http://www.isg.rhul.ac.uk/˜sdg/crypto-book/ The copyrig Chapter 17 Lattice Basis Reduction This is a chapter from version 1.1 of the book “Mathematics of Public Key Cryptography” by Steven Galbraith, available from http://www.isg.rhul.ac.uk/˜sdg/crypto-book/ The copyrig](https://www.pdfsearch.io/img/b3d0b221ce71a34cb896148d9288ffa9.jpg) | Add to Reading ListSource URL: www.math.auckland.ac.nz- Date: 2014-01-05 18:06:58
|
---|
10![Efficient Public-Key Cryptography in the Presence of Key Leakage Yevgeniy Dodis∗ Kristiyan Haralambiev † Adriana L´opez-Alt ‡ Efficient Public-Key Cryptography in the Presence of Key Leakage Yevgeniy Dodis∗ Kristiyan Haralambiev † Adriana L´opez-Alt ‡](https://www.pdfsearch.io/img/ee2b40d55402e5c57e1225c33958682d.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2010-09-15 14:13:14
|
---|