Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2967
search results - page 50 / 594
»
Cryptology
Sort
relevance
views
votes
recent
update
View
thumb
title
80
click to vote
CRYPTO
1992
Springer
140
views
Cryptology
»
more
CRYPTO 1992
»
Wallet Databases with Observers
15 years 1 months ago
Download
www.cs.elte.hu
David Chaum, Torben P. Pedersen
claim paper
Read More »
68
click to vote
CRYPTO
1992
Springer
125
views
Cryptology
»
more
CRYPTO 1992
»
Pricing via Processing or Combatting Junk Mail
15 years 1 months ago
Download
dasan.sejong.ac.kr
Cynthia Dwork, Moni Naor
claim paper
Read More »
41
click to vote
ASIACRYPT
1990
Springer
145
views
Cryptology
»
more
ASIACRYPT 1990
»
LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications
15 years 1 months ago
Download
www.uow.edu.au
Lawrence Brown, Josef Pieprzyk, Jennifer Seberry
claim paper
Read More »
59
click to vote
CRYPTO
1989
Springer
80
views
Cryptology
»
more
CRYPTO 1989
»
Addition Chain Heuristics
15 years 1 months ago
Download
eref.uqu.edu.sa
Jurjen N. Bos, Matthijs J. Coster
claim paper
Read More »
60
click to vote
CRYPTO
1989
Springer
90
views
Cryptology
»
more
CRYPTO 1989
»
UNIX Password Security - Ten Years Later
15 years 1 months ago
Download
www.cs.technion.ac.il
David C. Feldmeier, Philip R. Karn
claim paper
Read More »
« Prev
« First
page 50 / 594
Last »
Next »