×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [security proofs]
Home >
security proofs
1 Decoy State Quantum Key Distribution (QKD) Hoi-Kwong Lo Center for Quantum Information and Quantum Control Dept. of Electrical & Comp. Engineering (ECE);
220 views
Quantum Cryptography and Possible Attacks-slide
1.458 views
Security of continuous variable quantum key distribution against general attacks
158 views
Searching Encrypted Cloud Data: Academia and Industry Done Right
474 views
Carnegie Mellon Paper
1.248 views
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs New York University Efficient Public-Key Cryptography in the Presence of Leakage.
230 views
Proving Security Protocols Correct— Correctly Jonathan Herzog 21 March 2006 The author's affiliation with The MITRE Corporation is provided for identification.
214 views
A Designer’s Guide to KEMs Alex Dent
[email protected]
alex.
229 views
1 Provable Security Sebastian Faust Ruhr-Universität Bochum, Germany.
218 views
1 An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model (Multimedia University) Ji-Jian Chin Swee-Huay Heng Bok-Min.
214 views
ON CONTINUAL LEAKAGE OF DISCRETE LOG REPRESENTATIONS Shweta Agrawal IIT, Delhi Joint work with Yevgeniy Dodis, Vinod Vaikuntanathan and Daniel Wichs Several.
219 views
Key Agreement Guilin Wang School of Computer Science 12 Nov. 2007.
216 views
Next >