Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2967
search results - page 89 / 594
»
Cryptology
Sort
relevance
views
votes
recent
update
View
thumb
title
95
Voted
ASIACRYPT
2005
Springer
103
views
Cryptology
»
more
ASIACRYPT 2005
»
Errors in Computational Complexity Proofs for Protocols
15 years 10 months ago
Download
eprint.iacr.org
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchco...
claim paper
Read More »
99
Voted
MYCRYPT
2005
Springer
123
views
Cryptology
»
more
MYCRYPT 2005
»
On Session Key Construction in Provably-Secure Key Establishment Protocols
15 years 10 months ago
Download
eprint.iacr.org
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchco...
claim paper
Read More »
122
Voted
ACNS
2010
Springer
125
views
Cryptology
»
more
ACNS 2010
»
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption
15 years 9 months ago
Download
eprint.iacr.org
Aurélie Bauer, Jean-Sébastien Coron,...
claim paper
Read More »
131
Voted
EUROCRYPT
2010
Springer
162
views
Cryptology
»
more
EUROCRYPT 2010
»
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
15 years 9 months ago
Download
crypto.rd.francetelecom.com
Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitr...
claim paper
Read More »
111
Voted
FSE
2010
Springer
127
views
Cryptology
»
more
FSE 2010
»
Another Look at Complementation Properties
15 years 9 months ago
Download
cist.korea.ac.kr
Charles Bouillaguet, Orr Dunkelman, Gaëtan Le...
claim paper
Read More »
« Prev
« First
page 89 / 594
Last »
Next »