Γ
All
Videos π¬
Audios π΅
eBooks π
Mobile Apps π±
Archives (ZIP/ISO) πΏ
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems (2009) - Applebaum, Cash, Peikert, Sahai.pdf.gz
Home
/
Discover
/
www.kgay4all.com
/
Books
/
library--
/
cryptography & mathematics
/
Parent Folder
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems (2009) - Applebaum, Cash, Peikert, Sahai.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Extensions to Chaumβs Blind Signature Scheme and OpenCoin Requirements - Dents, Wilds.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms (2001) - Gallant, Lambert, Vanstone.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Extending the Salsa20 Nonce (2011) - Bernstein.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Faster batch forgery identification (2012) - Bernstein, Doumen, Lange, Oosterwijk.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case? (2016) - Kim, Barbulescu.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Finite Fields - Lange.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project (2009) - Camenisch et. al.pdf.gz
GZ
2 years ago
106 bytes
Copy Link
Encryption Schemes Secure Against Selective Opening Attack (2008) - Bellare, Yilek.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Finite Fields with Applications to Coding Theory, Cryptography, and Related Areas (2010) - Mullen, Stichtenoth, Tapia-Recillas.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Efficient Non-interactive Proof Systems for Bilinear Groups (2008)[full] - Groth, Sahai.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Format Oracles on OpenPGP (2015) - Maury et. al.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Efficient Non-interactive Proof Systems for Bilinear Groups (2008) - Groth, Sahai.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Forward Secure Messaging from Puncturable Encryption (2015) - Green, Miers.pdf.gz
GZ
2 years ago
Get Size
Copy Link
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security (2002) - Bellare et. al.pdf.gz
GZ
2 years ago
106 bytes
Copy Link
Distributed Key Generation and Its Applications (2010) - Kate.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Gaussian Random Number Generators (2007) - Thomas, Luk, Leong, Villasenor.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Distance-Bounding Protocols (1994) - Brands, Chaum.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Geometric Algebra with Applications in Science and Engineering (2001) - Hestenes, Corrochano, Sobczyk.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Diffie-Hellmann Key Exchange Protocol and Non-Abelian Nilpotent Groups (2008) - Mahalonobis.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.