Cryptographic primitive

Results: 89



#Item
51[removed]
  OpenOffice v3.x Security Design Weaknesses  Eric Filiol [removed]

[removed] OpenOffice v3.x Security Design Weaknesses Eric Filiol [removed]

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
52Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Department of Computer Science

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Department of Computer Science

Add to Reading List

Source URL: www.zisc.ethz.ch

Language: English - Date: 2015-02-14 08:12:18
53ZISC annual report[removed]

ZISC annual report[removed]

Add to Reading List

Source URL: www.zisc.ethz.ch

Language: English - Date: 2015-02-14 14:43:29
54Ärendetyp: 6 SP-188 Diarienummer 13FMV128772:1 Dokument ID FMVID[removed]

Ärendetyp: 6 SP-188 Diarienummer 13FMV128772:1 Dokument ID FMVID[removed]

Add to Reading List

Source URL: www.fmv.se

Language: English - Date: 2013-06-25 04:56:56
55ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash Sarah Meiklejohn University of California, San Diego smeiklej@ cs.ucsd.edu

ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash Sarah Meiklejohn University of California, San Diego smeiklej@ cs.ucsd.edu

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:48:12
56Call for Papers - Lightweight Cryptography Workshop 2015

Call for Papers - Lightweight Cryptography Workshop 2015

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-11-05 15:20:18
57Remarks on the Cryptographic Primitive of Attribute-based Encryption Zhengjun Cao1 , Lihua Liu2,∗

Remarks on the Cryptographic Primitive of Attribute-based Encryption Zhengjun Cao1 , Lihua Liu2,∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-15 01:22:56
581  Q2S Edon-R, An Infinite Family of Cryptographic Hash Functions

1 Q2S Edon-R, An Infinite Family of Cryptographic Hash Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:38:20
59Report on DIMACS∗ Workshop on Cryptography: Theory Meets Practice Presented under the auspices of the Special Focus on Communication Security and Information Privacy and the PORTIA project. Date of Workshop: October 14

Report on DIMACS∗ Workshop on Cryptography: Theory Meets Practice Presented under the auspices of the Special Focus on Communication Security and Information Privacy and the PORTIA project. Date of Workshop: October 14

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2005-07-15 15:00:33
60High throughput asynchronous algorithms for message authentication Scott A Crosby and Dan S. Wallach Rice University December 14, 2010 Abstract

High throughput asynchronous algorithms for message authentication Scott A Crosby and Dan S. Wallach Rice University December 14, 2010 Abstract

Add to Reading List

Source URL: tamperevident.cs.rice.edu

Language: English - Date: 2010-12-14 09:05:23