×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroup (1997) - Lim, Lee.pdf.gz
Home
/
Discover
/
www.kgay4all.com
/
Books
/
library--
/
cryptography & mathematics
/
Parent Folder
A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroup (1997) - Lim, Lee.pdf.gz
GZ
2 years ago
Get Size
Copy Link
A Fair and Efficient Solution to the Socialist Millionaires' Problem (2001) - Boudot et. al.pdf.gz
GZ
2 years ago
Get Size
Copy Link
A Kilobit Hidden SNFS Discrete Logarithm Computation (2016) - Fried, Gaudry, Heninger, Thomé.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
A Cryptographic Framework for the Controlled Release Of Certified Data (2006) - Bangeter, Camenisch, Lysyanskaya.pdf.gz
GZ
2 years ago
Get Size
Copy Link
A Note on the Circular Complex Centered Form (1983) - Rokne, Wu.pdf.gz
GZ
2 years ago
Get Size
Copy Link
12th International Workshop on Computer Security Protocols (2004).pdf.gz
GZ
2 years ago
Get Size
Copy Link
A Novel Chaotic Encryption Scheme Based on Pseudorandom Bit Padding (2012) - Ahadpour, Fard, Sadra.pdf.gz
GZ
2 years ago
Get Size
Copy Link
A Riddle Wrapped in an Enigma (2015) - Koblitz, Menezes.pdf.gz
GZ
2 years ago
Get Size
Copy Link
A Scalable and Unifed Multiplier Architecture for Finite Fields GF(p) and GF(2m) (2000) - Savaş, Tenca, Koç.pdf.gz
GZ
2 years ago
Get Size
Copy Link
A Secret Sharing Scheme Based on Group Presentations and the Word Problem (2012) - Habeeb, Kahrobaei, Shpilrain.pdf.gz
GZ
2 years ago
Get Size
Copy Link
A Security Analysis of the Composition of ChaCha20 and Poly1305 (2014) - Procter.pdf.gz
GZ
2 years ago
Get Size
Copy Link
An Efficient Group Key Management Using Code for Key Calculation for Simultaneous Join Leave: CKCS (2012) - Hajyvahabzadeh et. al.pdf.gz
GZ
2 years ago
Get Size
Copy Link
An Introduction to Mathematical Cryptography (2014) - Hoffstein, Pipher, Silverman.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Another Look at "Provable Security" (2004) - Koblitz, Menezes.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Another Look at HMQV (2007) - Menezes.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems (2002) - Cachin, Kursawe, Lysyanskaya, Strobl.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Batch Binary Edwards (2009) - Bernstein.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Batch Verification of Short Signatures (2011) - Camenisch, Hohenberger, Pedersen.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Bleichenbacher's Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption (2014) - Jager, Schinzel, Somorovsky.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Candidate Multilinear Maps from Ideal Lattices (2013) - Garg, Gentry, Halevi.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.