Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2967
search results - page 3 / 594
»
Cryptology
Sort
relevance
views
votes
recent
update
View
thumb
title
12
click to vote
CODCRY
2009
Springer
133
views
Cryptology
»
more
CODCRY 2009
»
On Cayley Graphs, Surface Codes, and the Limits of Homological Coding for Quantum Error Correction
13 years 11 months ago
Download
www.math.u-bordeaux.fr
Gilles Zémor
claim paper
Read More »
17
click to vote
CRYPTO
2009
Springer
156
views
Cryptology
»
more
CRYPTO 2009
»
How to Hash into Elliptic Curves
13 years 11 months ago
Download
www.iacr.org
Thomas Icart
claim paper
Read More »
18
click to vote
AFRICACRYPT
2008
Springer
126
views
Cryptology
»
more
AFRICACRYPT 2008
»
The Psychology of Security
13 years 11 months ago
Download
www.schneier.com
Bruce Schneier
claim paper
Read More »
8
click to vote
AFRICACRYPT
2008
Springer
179
views
Cryptology
»
more
AFRICACRYPT 2008
»
New Definition of Density on Knapsack Cryptosystems
13 years 11 months ago
Download
www.math.unicaen.fr
Noboru Kunihiro
claim paper
Read More »
11
click to vote
AFRICACRYPT
2008
Springer
94
views
Cryptology
»
more
AFRICACRYPT 2008
»
Stream Ciphers Using a Random Update Function: Study of the Entropy of the Inner State
13 years 11 months ago
Download
www.math.unicaen.fr
Andrea Röck
claim paper
Read More »
« Prev
« First
page 3 / 594
Last »
Next »