Γ
All
Videos π¬
Audios π΅
eBooks π
Mobile Apps π±
Archives (ZIP/ISO) πΏ
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Distributed Key Generation and Its Applications (2010) - Kate.pdf.gz
Home
/
Discover
/
www.kgay4all.com
/
Books
/
library--
/
cryptography & mathematics
/
Parent Folder
Distributed Key Generation and Its Applications (2010) - Kate.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Distance-Bounding Protocols (1994) - Brands, Chaum.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Diffie-Hellmann Key Exchange Protocol and Non-Abelian Nilpotent Groups (2008) - Mahalonobis.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Efficient Non-interactive Proof Systems for Bilinear Groups (2008) - Groth, Sahai.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Deterministic and Efficiently Searchable Encryption (2007) - Bellare, Boldyreva, OβNeill.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Efficient Non-interactive Proof Systems for Bilinear Groups (2008)[full] - Groth, Sahai.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Detecting Perfect Powers in Essentially Linear Time (1998) - Bernstein.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Encryption Schemes Secure Against Selective Opening Attack (2008) - Bellare, Yilek.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Cryptography and Coding: 10th IMA International Conference Proceedings (2005) - Smart.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project (2009) - Camenisch et. al.pdf.gz
GZ
2 years ago
106 bytes
Copy Link
Cryptography Made Simple (2016) - Smart.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case? (2016) - Kim, Barbulescu.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Cryptocat: Circumventing Internet Censorship Threats (2012) - Kobeissi.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Extending the Salsa20 Nonce (2011) - Bernstein.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Cryptanalysis of Twofish (2000) - Shiho, Lin.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Extensions to Chaumβs Blind Signature Scheme and OpenCoin Requirements - Dents, Wilds.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems (2009) - Applebaum, Cash, Peikert, Sahai.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Cryptanalysis of Iterated Block Ciphers [thesis] (1997) - Rijmen.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
Credential Authenticated Identification and Key Exchange (2010) - Camenisch, Casati, Gross, Shoup.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms (2001) - Gallant, Lambert, Vanstone.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.