Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Cryptographic'
Cryptographic published presentations and documents on DocSlides.
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion
by olivia-moreira
for Cryptographic. . Agents. Shashank Agrawal, ....
Introduction to Cryptographic Currencies
by natalia-silvester
Claudio . Orlandi. cs.au.dk. /~. orlandi. Thanks ...
Cryptographic protocols Or how to use maths to keep secrets
by marina-yarberry
Vanessa Teague, March 2017. vjteague@unimelb.edu....
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Securi
by cheryl-pisano
for Cryptographic. . Agents. Shashank Agrawal, ....
On the Cryptographic Complexity of the Worst Functions
by briana-ranney
Amos . Beimel. . (BGU). Yuval . Ishai. (. Techn...
Overview on Hardware
by aaron
Security. Electronic Design Contest - 2017. Outli...
Seminar in Cryptographic Protocols:
by mitsue-stanley
Program . Obfuscation. Omer Singer. June 8, 2009....
Cryptographic Multilinear Maps:
by lois-ondreau
Applications, construction, Cryptanalysis. Diaman...
Cryptographic
by conchita-marotz
Multilinear. Maps. Sanjam. . Garg. , . Craig Ge...
COMSEC
by briana-ranney
(Communications Security). Overview. The types of...
Cryptographic Systems
by karlyn-bohler
A network LAN can be secured through:. Device har...
Copyright Mocana Corporation 2011May be reproduced only in its origina
by trish-goza
Mocana Corporation Mocana Cryptographic Loadable K...
The Mechanical Cryptographer
by briana-ranney
(Tolerant Algebraic Side-Channel Attacks using ps...
Leakage-Resilient
by tatyana-admore
. Cryptography. Stefan. . Dziembowski. Universi...
Cryptographic Blackjack Alvin AuYoung and Christopher Tuttle CSE 207: Final Project, Spring 2004 University of Californi
by test
.ucsd.edu Abstract Internet casinos have become a ...
Cryptographic Cloud Storage Seny Kamara Microsoft Research senykmicrosoft
by ellena-manuel
com Kristin Lauter Microsoft Research klautermicro...
Cryptographic Shuing of Random and Pseudorandom Sequences Markus Dichtl Siemens Corporate Technology Email Markus
by tawny-fly
Dichtlsiemenscom Abstract This papers studies meth...
Annex C Approved Random Number Generators for FIPS PUB Security Requirements for Cryptographic Modules February Draft Randall J
by tawny-fly
Easter Carolyn French Information Technology Labo...
C ONTRIBUTED ESEARCH RTICLES Cryptographic Boolean Functions with R by Frdric Latte Dirk Van Heule and Julien Van hamme Abstract A new package called boolfun is avail able for R users
by karlyn-bohler
The package provides tools to handle Boolean func...
Annex A Approved Security Functions for FIPS PUB Security Requirements for Cryptographic Modules October Draft Randall J
by stefany-barnette
Easter Carolyn French Information Technology Labo...
Annex D Approved Key Establishment Techniques for FIPS PUB Security Requirements for Cryptographic Modules October Draft Randall J
by alida-meadow
Easter Carolyn French Information Technology Labo...
Ask a Better Question Get a Better Answer A New Approach to Private Data Analysis Cynthia Dwork Microsoft Research dworkmicrosoft
by luanne-stotts
com Abstract Cryptographic techniques for reasonin...
Hiding Cliques for Cryptographic Securit AriJuels Marc
by danika-pritchard
The problem in question is that of nding a large ...
CoercionResistant Cryptographic Voting Implementing Fr
by pasty-toler
Weber swebertkinformatiktudarmstadtde 1 Introduct...
Using Linear Congruential Generators for Cryptographic
by jane-oiler
In particular we choose email encryption as our c...
AlanTuringYear workshop Is Cryptographic Theory Practi
by trish-goza
KDW57347GR5734757347PHDQ57347E57347FUSWRJUDSKHU57...
NIST IR NIST Cryptographic Standards and Guidelines
by tatiana-dople
S Department of Commerce Penny Pritzker Secretary...
Chapter 8: Cryptographic Foibles Foible: a weakness or idiosyncrasy 1.
by debby-jeon
http://csrc.nist.gov/publications/fips/fips186-2/f...
Security of Authentication Protocols
by calandra-battersby
Alexander . Potapov. Authentication definition. P...
The Design of a Cryptography Based Secure File System
by giovanna-bartolotta
By ....
Federal Information Processing Standard (FIPS) 140-1
by alida-meadow
http://csrc.nist.gov/publications/fips/fips140-2/f...
Guide to Network Defense and Countermeasures
by yoshiko-marsland
. Third . Edition. . Chapter . 5. Cryptography....
Cryptography Introduction
by alida-meadow
CS 465. Last Updated. : . Aug 25, 2015. Outline. ...
Cryptographic Security
by faustina-dinatale
Cryptographic Mechanisms. 1. Mesbah. Islam– . ...
A High-Speed Elliptic Curve Cryptographic Processor
by myesha-ticknor
for Generic Curves over GF(. p. ). Yuan Ma, . Zon...
Business Convergence WS#2
by kittie-lecroy
Smart Grid Technologies and Project Use Cases. Em...
Cryptographic Multilinear Maps:
by danika-pritchard
Applications, construction, Cryptanalysis. Diaman...
Secure storage of cryptographic keys within random volumetr
by tatiana-dople
Roarke Horstmeyer. 1. , Benjamin Judkewitz. 1. , ...
Leakage-Resilient
by min-jolicoeur
. Cryptography. Stefan. . Dziembowski. Universi...
What's wrong with cryptographic API design
by pamella-moone
securely composing algorithms
Load More...