Γ
All
Videos π¬
Audios π΅
eBooks π
Mobile Apps π±
Archives (ZIP/ISO) πΏ
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Detecting Perfect Powers in Essentially Linear Time (1998) - Bernstein.pdf.gz
Home
/
Discover
/
www.kgay4all.com
/
Books
/
library--
/
cryptography & mathematics
/
Parent Folder
Detecting Perfect Powers in Essentially Linear Time (1998) - Bernstein.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Cryptography and Coding: 10th IMA International Conference Proceedings (2005) - Smart.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Deterministic and Efficiently Searchable Encryption (2007) - Bellare, Boldyreva, OβNeill.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Cryptography Made Simple (2016) - Smart.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Diffie-Hellmann Key Exchange Protocol and Non-Abelian Nilpotent Groups (2008) - Mahalonobis.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Cryptocat: Circumventing Internet Censorship Threats (2012) - Kobeissi.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Distance-Bounding Protocols (1994) - Brands, Chaum.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Cryptanalysis of Twofish (2000) - Shiho, Lin.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Distributed Key Generation and Its Applications (2010) - Kate.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Cryptanalysis of Iterated Block Ciphers [thesis] (1997) - Rijmen.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
Credential Authenticated Identification and Key Exchange (2010) - Camenisch, Casati, Gross, Shoup.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Efficient Non-interactive Proof Systems for Bilinear Groups (2008) - Groth, Sahai.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Constructing Perfect Steganographic Systems (2011) - Ryabko, Ryabko.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Efficient Non-interactive Proof Systems for Bilinear Groups (2008)[full] - Groth, Sahai.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Encryption Schemes Secure Against Selective Opening Attack (2008) - Bellare, Yilek.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Computing on Authenticated Data (2011) - Ahn, Boneh, Camenisch, Hohenberger, shelat, Waters.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project (2009) - Camenisch et. al.pdf.gz
GZ
2 years ago
106 bytes
Copy Link
Coda: Decentralized Cryptocurrency at Scale (2018) - Meckler, Shapiro.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case? (2016) - Kim, Barbulescu.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Cheating Prevention in Visual Cryptography (2007) - Hu, Tzeng.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.