Cryptographic primitive

Results: 89



#Item
11

PDF Document

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:13
12Proving Computational Security with a General-Purpose C Verifier A 5-Minute Talk Fran¸cois Dupressoir The Open University

Proving Computational Security with a General-Purpose C Verifier A 5-Minute Talk Fran¸cois Dupressoir The Open University

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:11
13Towards a Game Theoretic View of Secure Computation Gilad Asharov∗ Ran Canetti†

Towards a Game Theoretic View of Secure Computation Gilad Asharov∗ Ran Canetti†

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2015-07-03 05:13:02
14Poster: Security in E-Voting Daniel Bruns† , Huy Quoc Do‡ , Simon Greiner† , Mihai Herda† , Martin Mohr† , Enrico Scapin∗ , Tomasz Truderung∗ , Bernhard Beckert† , Ralf Küsters∗ , Heiko Mantel‡ and R

Poster: Security in E-Voting Daniel Bruns† , Huy Quoc Do‡ , Simon Greiner† , Mihai Herda† , Martin Mohr† , Enrico Scapin∗ , Tomasz Truderung∗ , Bernhard Beckert† , Ralf Küsters∗ , Heiko Mantel‡ and R

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:19
15SECURITY DRIVEN .NET .NET/ASP.NET 4.5 STAN DRAPKIN. OCTOBER 2013.  SECURITY DRIVEN .NET

SECURITY DRIVEN .NET .NET/ASP.NET 4.5 STAN DRAPKIN. OCTOBER 2013. SECURITY DRIVEN .NET

Add to Reading List

Source URL: securitydriven.net

Language: English - Date: 2015-04-04 22:36:18
16Formal Certification of Code-Based Cryptographic Proofs Gilles Barthe1,2 Benjamin Gr´egoire1,3  Santiago Zanella1,3

Formal Certification of Code-Based Cryptographic Proofs Gilles Barthe1,2 Benjamin Gr´egoire1,3 Santiago Zanella1,3

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
17Formal Certification of Code-Based Cryptographic Proofs Gilles Barthe1,2 Benjamin Gr´egoire1,3  Santiago Zanella1,3

Formal Certification of Code-Based Cryptographic Proofs Gilles Barthe1,2 Benjamin Gr´egoire1,3 Santiago Zanella1,3

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
18Evaluating Post-Quantum Asymmetric Cryptographic Algorithm Candidates

Evaluating Post-Quantum Asymmetric Cryptographic Algorithm Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:28:55
19Verification of security protocols — reducing the number of agents — Laboratory, institution and university LSV, ENS Cachan and LORIA, Nancy universités The internship will be located at Nancy and/or at ENS Cachan d

Verification of security protocols — reducing the number of agents — Laboratory, institution and university LSV, ENS Cachan and LORIA, Nancy universités The internship will be located at Nancy and/or at ENS Cachan d

Add to Reading List

Source URL: www.lsv.ens-cachan.fr

Language: English - Date: 2014-10-21 15:33:34
20Arithmetic Cryptography∗ Benny Applebaum† Jonathan Avron∗  Christina Brzuska‡

Arithmetic Cryptography∗ Benny Applebaum† Jonathan Avron∗ Christina Brzuska‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-14 07:10:50