×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [cryptographic applications]
Home >
cryptographic applications
Java script and web cryptography (cf.objective)
293 views
DNS PPT
433 views
A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over GF(p ) Yuan Ma, Zongbin Liu, Wuqiong Pan, Jiwu Jing State Key Laboratory of.
222 views
Complexity Theory Lecture 10 Lecturer: Moni Naor.
216 views
Intel trng report_20120312
902 views
Fault Detection Scheme for AES Using Composite Field
257 views
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
293 views
Reconfigurable trust forembeddedcomputingplatforms
25 views
Class 1
37 views
1 Reducing Complexity Assumptions for Statistically-Hiding Commitment Iftach Haitner Omer Horviz Jonathan Katz Chiu-Yuen Koo Ruggero Morselli Ronen Shaltiel.
217 views
Complexity Theory Lecture 9 Lecturer: Moni Naor. Recap Last week: –Toda’s Theorem: PH P #P. –Program checking and hardness on the average of the permanent.
214 views
Fubswrjudskb Frxuvh qxpehu:4003-482 / 4005-705 Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
218 views
Next >