Γ
All
Videos π¬
Audios π΅
eBooks π
Mobile Apps π±
Archives (ZIP/ISO) πΏ
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices (2012) - Henninger, Durumeric, Wustrow, Halderman.pdf.gz
Home
/
Discover
/
www.kgay4all.com
/
Books
/
library--
/
cryptography & mathematics
/
Parent Folder
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices (2012) - Henninger, Durumeric, Wustrow, Halderman.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Message Authentication, Revisited (2012) - Dodis, Kiltz, Pietrzak, Wichs.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Modular Polynomials via Isogeny Volcanoes (2012) - BroΜker, Lauter, Sutherland.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Mathematics Made Difficult (1972) - Linderholm.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Lattices [mathemetical definitions] (2002) - Brouwer.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Multiparty Computation with Faulty Majority (1990) - Beaver, Goldwasser.pdf.gz
GZ
2 years ago
Get Size
Copy Link
LUKS On-Disk Format Specification Version 1.1.1 (2008).pdf.gz
GZ
2 years ago
Get Size
Copy Link
Kummer Strikes Back: New DH Speed Records (2014) - Bernstein, Lange, et. al.pdf.gz
GZ
2 years ago
Get Size
Copy Link
NaCl: The security impact of a new cryptographic library (2012) - Bernstein, Lange, Schwabe.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Kolmogorov Complexity, Circuits, and the Strength of Formal Theories of Arithmetic (2013) - Davie, Friedman, Hopkins, Tzameret.pdf.gz
GZ
2 years ago
Get Size
Copy Link
New Algorithm for the Discrete Logarithm Problem on Elliptic Curves (2015) - Semaev.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Kolmogorov Complexity and Its Applications [slides] (2009) - Ming Li.pdf.gz
GZ
2 years ago
Get Size
Copy Link
New Definitions and Separations for Circular Security (2012) - Cash, Green, Hohenberger.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Keeping Authorities Honest-or-Bust with Decentralized Witness Cosigning (2015) - Syta, Tamas, Jovanovic, Gasser, Gailly, Khoffi, Ford, Visher, Wolisky.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Introduction to Twin Primes and Brun's Constant Computation (2002) - Sebah, Gourdon.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing [Pedersen Commitment Scheme] (1989) - Pedersen.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Obfuscating Circuits via Composite-Order Graded Encoding (2015) - Applebaum, Brakerski.pdf.gz
GZ
2 years ago
Get Size
Copy Link
On Splitting a Point with Summation Polynomials in Binary Elliptic Curves (2016) - Courtois.pdf.gz
GZ
2 years ago
Get Size
Copy Link
On The Design and Security of RC2 (1998) - Knudsen, Rijmen, Rivest, Robshaw.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Insecurity Against Selective-Opening Attacks: Some Key Ideas (2012) - Mouradian.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
Join FilePursuit on
chat for discussions and more information.