Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
1769
search results - page 74 / 354
»
Cryptography
Sort
relevance
views
votes
recent
update
View
thumb
title
101
click to vote
SERSCISA
2010
Springer
161
views
Computer Networks
»
more
SERSCISA 2010
»
Post-quantum Cryptography: Code-Based Signatures
15 years 4 months ago
Download
cayrel.net
Pierre-Louis Cayrel, Mohammed Meziani
claim paper
Read More »
87
click to vote
ACSW
2004
114
views
Security Privacy
»
more
ACSW 2004
»
Secure Key Issuing in ID-based Cryptography
15 years 4 months ago
Download
crpit.com
Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Ki...
claim paper
Read More »
135
click to vote
FCS
2006
112
views
Computer Science
»
more
FCS 2006
»
Mixed States in Quantum Cryptography
15 years 4 months ago
Download
ww1.ucmss.com
Ansis Rosmanis, Ilze Dzelme-Berzina
claim paper
Read More »
99
click to vote
ICISC
2001
74
views
Cryptology
»
more
ICISC 2001
»
Practical Security in Public-Key Cryptography
15 years 4 months ago
Download
www.di.ens.fr
David Pointcheval
claim paper
Read More »
213
click to vote
NIPS
2004
209
views
Information Technology
»
more
NIPS 2004
»
Synchronization of neural networks by mutual learning and its application to cryptography
15 years 4 months ago
Download
books.nips.cc
Two neural networks that are trained on their mutual output synchronize to an identical time dependant weight vector. This novel phenomenon can be used for creation of a secure cr...
Einat Klein, Rachel Mislovaty, Ido Kanter, Andreas...
claim paper
Read More »
« Prev
« First
page 74 / 354
Last »
Next »