ร
All
Videos ๐ฌ
Audios ๐ต
eBooks ๐
Mobile Apps ๐ฑ
Archives (ZIP/ISO) ๐ฟ
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Kolmogorov Complexity and Its Applications [slides] (2009) - Ming Li.pdf.gz
Home
/
Discover
/
www.kgay4all.com
/
Books
/
library--
/
cryptography & mathematics
/
Parent Folder
Kolmogorov Complexity and Its Applications [slides] (2009) - Ming Li.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Keeping Authorities Honest-or-Bust with Decentralized Witness Cosigning (2015) - Syta, Tamas, Jovanovic, Gasser, Gailly, Khoffi, Ford, Visher, Wolisky.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Kolmogorov Complexity, Circuits, and the Strength of Formal Theories of Arithmetic (2013) - Davie, Friedman, Hopkins, Tzameret.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Introduction to Twin Primes and Brun's Constant Computation (2002) - Sebah, Gourdon.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Kummer Strikes Back: New DH Speed Records (2014) - Bernstein, Lange, et. al.pdf.gz
GZ
2 years ago
Get Size
Copy Link
LUKS On-Disk Format Specification Version 1.1.1 (2008).pdf.gz
GZ
2 years ago
Get Size
Copy Link
Lattices [mathemetical definitions] (2002) - Brouwer.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Mathematics Made Difficult (1972) - Linderholm.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Insecurity Against Selective-Opening Attacks: Some Key Ideas (2012) - Mouradian.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
Inner Product Spaces (2007) - Lankham, Nactergaele, Schilling.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Message Authentication, Revisited (2012) - Dodis, Kiltz, Pietrzak, Wichs.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices (2012) - Henninger, Durumeric, Wustrow, Halderman.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Modular Polynomials via Isogeny Volcanoes (2012) - Broฬker, Lauter, Sutherland.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice (2015) - Adrian, Bhargavan, Durumeric, Gaudry, Green, Halderman, Heninger, Springall, Thomeฬ, Valenta, VanderSloot, Wustrow, Zanella-Beฬguelin, Zimmermann.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Ideals, Varieties, and Algorithms (2015) - Cox, Little, OShea.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Multiparty Computation with Faulty Majority (1990) - Beaver, Goldwasser.pdf.gz
GZ
2 years ago
Get Size
Copy Link
How Secure is TextSecure? (2014) - Frosch, Mainka, Bader, Bergsma, Schwenk, Holz.pdf.gz
GZ
2 years ago
Get Size
Copy Link
NaCl: The security impact of a new cryptographic library (2012) - Bernstein, Lange, Schwabe.pdf.gz
GZ
2 years ago
Get Size
Copy Link
New Algorithm for the Discrete Logarithm Problem on Elliptic Curves (2015) - Semaev.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Honey Encryption: Security Beyond the Brute-Force Bound (2014) - Juels.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.