×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE) (2015) - Devadas, Dijk, Fletcher, Ren.pdf.gz
Home
/
Discover
/
www.kgay4all.com
/
Books
/
library--
/
cryptography & mathematics
/
Parent Folder
Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE) (2015) - Devadas, Dijk, Fletcher, Ren.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
One-Round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability (2011) - Cremers, Feltz.pdf.gz
GZ
2 years ago
Get Size
Copy Link
OpenPGP-based Financial Instruments and Dispute Arbitration (2008) - Nagy, Shakel.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
Polynomial Evaluation and Message Authentication (2007) - Bernstein.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
On The Design and Security of RC2 (1998) - Knudsen, Rijmen, Rivest, Robshaw.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Practical Multilinear Map over the Integers (2013) - Coroni, Lepoint, Tibouchi.pdf.gz
GZ
2 years ago
Get Size
Copy Link
On Splitting a Point with Summation Polynomials in Binary Elliptic Curves (2016) - Courtois.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Obfuscating Circuits via Composite-Order Graded Encoding (2015) - Applebaum, Brakerski.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing (2012) - Camenisch, Lysyanskaya, Neven.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing [Pedersen Commitment Scheme] (1989) - Pedersen.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Prime Numbers and Computer Methods for Factorization (1994) - Riesel.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
Prime Numbers and Computer Methods for Factorization (2012) - Riesel.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
New Definitions and Separations for Circular Security (2012) - Cash, Green, Hohenberger.pdf.gz
GZ
2 years ago
Get Size
Copy Link
New Algorithm for the Discrete Logarithm Problem on Elliptic Curves (2015) - Semaev.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Princeton COS 507D Advanced Topics in Computer Science: A Theorist's Toolkit (Fall 2002) - Arora.pdf.gz
GZ
2 years ago
Get Size
Copy Link
NaCl: The security impact of a new cryptographic library (2012) - Bernstein, Lange, Schwabe.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Quaternion Algebras.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Ratcheted Encryption and Key Exchange: The Security of Messaging (2016) - Bellare, Singh, Jaeger, Nyayapati, Stepanovs.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Multiparty Computation with Faulty Majority (1990) - Beaver, Goldwasser.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Rational Curves on a K3 Surface (2009) - Elkies.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.