Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Merkle'
Merkle published presentations and documents on DocSlides.
Iris: A Scalable Cloud File
by kittie-lecroy
System. with . Efficient Integrity Checks. Marten...
Efficient Asynchronous Accumulators for Distributed PKI
by lois-ondreau
Sophia Yakoubov. Joint work with Leo . Reyzin. 1....
Merkle Puzzles are Optimal.
by lindy-dunigan
Mohammad . Mahmoody-Ghidary. Joint work with . Bo...
Case 0410072 Doc 48 Filed 011306 Entered 011306 124412
by ariel
Case 04-10072 Doc 48 Filed 01/13/06 Enter...
Collision resistance
by kittie-lecroy
Constructing Compression . F. unctions. Online Cr...
Merkle-Hellman Knapsack Cryptosystem
by calandra-battersby
Merkle offered $100 award for breaking singly - i...
TWOCLASSESOFLOGARITHMICALLYCOMPLETELYMONOTONICFUNCTIONS3usingthefactth
by sherrill-nordquist
(x);x 0;whereusually2[0;1],seeasurveyin[30]orthe...
Basic key exchange
by min-jolicoeur
Merkle. Puzzles. Online Cryptography Course ...
Merkle-Korff
by sherrill-nordquist
offers a full range of reliable, long-life PMDC m...
Authenticated Join Processing in Outsourced Databases
by tawny-fly
Yin Yang. , Dimitris Papadias, Stavros Papadopoul...
Merkle-Hellman Knapsack Cryptosystem
by trish-goza
Merkle offered $100 award for breaking singly - i...
Benedikt Bünz Joint work with:
by cheryl-pisano
Ben Fisch and Dan . Boneh. 1. Batching Techniques...
TheBiBaOneTimeSignatureandBroadcastAuthenticationProtocolAdrianPerrig
by patricia
supportsponsoredytheUnitedStatesDefenseAdvancedRes...
BoundsvSchemesMic
by davies
GroupersitCambridge,Massachusetts haelMitzenmacAdr...
TheBiBaOneTimeSignatureandBroadcastAuthenticationProtocolAdrianPerrig
by teresa
supportsponsoredytheUnitedStatesDefenseAdvancedRes...
Cryptography Lecture 7 Arpita
by ceila
. Patra. Quick Recall and Today’s Roadmap. >&...
Load More...