by
Robshaw, Matthew. editor.
Format:
Electronic Resources
Excerpt:
-- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number
by
Robshaw, Matthew. editor.
Format:
Electronic Resources
Excerpt:
-- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number
View Other Search Results
by
Robshaw, Matthew. editor.
Format:
Electronic Resources
Excerpt:
-- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number
by
Fischlin, Marc. editor.
Format:
Electronic Resources
Excerpt:
: (pseudo)randomness; LPN/LWE; cryptanalysis; masking; fully homomorphic encryption; number theory; hash
by
Fischlin, Marc. editor.
Format:
Electronic Resources
Excerpt:
: (pseudo)randomness; LPN/LWE; cryptanalysis; masking; fully homomorphic encryption; number theory; hash
by
Nguyen, Phong Q. editor.
Format:
Electronic Resources
Excerpt:
Pairing Implementations: Which Path Is More Secure? -- Algorithmic Number Theory -- Factorization of
by
Roy, Bimal. editor.
Format:
Electronic Resources
Excerpt:
Algebra and Number Theory -- Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log
by
Kurosawa, Kaoru. editor.
Format:
Electronic Resources
Excerpt:
Number Theory and Elliptic Curve -- A Kilobit Special Number Field Sieve Factorization -- When e-th
by
Cramer, Ronald. editor.
Format:
Electronic Resources
Excerpt:
Multi-party Computation with Optimal Resilience -- Algebra and Number Theory II -- Differential Cryptanalysis
Limit Search Results
Narrowed by: