by
Robshaw, Matthew. editor.
Format:
Electronic Resources
Excerpt:
-- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number
by
Fischlin, Marc. editor.
Format:
Electronic Resources
Excerpt:
: (pseudo)randomness; LPN/LWE; cryptanalysis; masking; fully homomorphic encryption; number theory; hash
View Other Search Results
by
Robshaw, Matthew. editor.
Format:
Electronic Resources
Excerpt:
-- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number
by
Fischlin, Marc. editor.
Format:
Electronic Resources
Excerpt:
: (pseudo)randomness; LPN/LWE; cryptanalysis; masking; fully homomorphic encryption; number theory; hash
by
Robshaw, Matthew. editor.
Format:
Electronic Resources
Excerpt:
-- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number
by
Piessens, Frank. editor.
Format:
Electronic Resources
Excerpt:
Comprehensive Model of Isolation for Mitigating Illicit Channels -- Correct Audit Logging: Theory and Practice
by
Nguyen, Phong Q. editor.
Format:
Electronic Resources
Excerpt:
Pairing Implementations: Which Path Is More Secure? -- Algorithmic Number Theory -- Factorization of
by
Sauveron, Damien. editor.
Format:
Electronic Resources
Excerpt:
resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although there are a number of
by
Kurosawa, Kaoru. editor.
Format:
Electronic Resources
Excerpt:
Number Theory and Elliptic Curve -- A Kilobit Special Number Field Sieve Factorization -- When e-th
Limit Search Results
Narrowed by: