Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2967
search results - page 62 / 594
»
Cryptology
Sort
relevance
views
votes
recent
update
View
thumb
title
89
click to vote
INDOCRYPT
2000
Springer
72
views
Cryptology
»
more
INDOCRYPT 2000
»
Improved Impossible Differentials on Twofish
15 years 9 months ago
Download
www.cosic.esat.kuleuven.be
Eli Biham, Vladimir Furman
claim paper
Read More »
135
click to vote
INDOCRYPT
2000
Springer
85
views
Cryptology
»
more
INDOCRYPT 2000
»
Symmetrically Private Information Retrieval
15 years 9 months ago
Download
www.cs.umd.edu
Sanjeev Kumar Mishra, Palash Sarkar
claim paper
Read More »
118
click to vote
PKC
2000
Springer
90
views
Cryptology
»
more
PKC 2000
»
Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications
15 years 8 months ago
Download
www.ipa.go.jp
Katsuyuki Okeya, Hiroyuki Kurumatani, Kouichi Saku...
claim paper
Read More »
139
click to vote
SACRYPT
2000
Springer
75
views
Cryptology
»
more
SACRYPT 2000
»
Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders
15 years 8 months ago
Download
pages.cpsc.ucalgary.ca
Detlef Hühnlein, Michael J. Jacobson Jr., Dam...
claim paper
Read More »
116
click to vote
CRYPTO
1995
Springer
93
views
Cryptology
»
more
CRYPTO 1995
»
XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions
15 years 8 months ago
Download
cseweb.ucsd.edu
Mihir Bellare, Roch Guérin, Phillip Rogaway
claim paper
Read More »
« Prev
« First
page 62 / 594
Last »
Next »