Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
1769
search results - page 71 / 354
»
Cryptography
Sort
relevance
views
votes
recent
update
View
thumb
title
55
click to vote
CARDIS
2006
Springer
88
views
Hardware
»
more
CARDIS 2006
»
Implementing Cryptography on TFT Technology for Secure Display Applications
15 years 1 months ago
Download
www.cl.cam.ac.uk
Petros Oikonomakos, Jacques J. A. Fournier, Simon ...
claim paper
Read More »
58
click to vote
DSN
2004
IEEE
89
views
Computer Networks
»
more
DSN 2004
»
Workshop on Fault Diagnosis and Tolerance in Cryptography
15 years 1 months ago
Download
conferenze.dei.polimi.it
Luca Breveglieri, Israel Koren
claim paper
Read More »
78
click to vote
CIS
2006
Springer
99
views
Applied Computing
»
more
CIS 2006
»
A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networks
15 years 1 months ago
Download
www.cl.cam.ac.uk
Xiaolong Li, Yaping Lin, Siqing Yang, Yeqing Yi, J...
claim paper
Read More »
60
click to vote
FOCS
2004
IEEE
105
views
Theoretical Computer Science
»
more
FOCS 2004
»
On the (Im)possibility of Cryptography with Imperfect Randomness
15 years 1 months ago
Download
www.cs.princeton.edu
We investigate the feasibility of a variety of cryptographic tasks with imperfect randomness. The kind of imperfect randomness we consider are entropy sources, such as those consi...
Yevgeniy Dodis, Shien Jin Ong, Manoj Prabhakaran, ...
claim paper
Read More »
79
click to vote
CSR
2006
Springer
73
views
Theoretical Computer Science
»
more
CSR 2006
»
Non-black-box Techniques in Cryptography
15 years 1 months ago
Download
www.math.ias.edu
Boaz Barak
claim paper
Read More »
« Prev
« First
page 71 / 354
Last »
Next »