Γ
All
Videos π¬
Audios π΅
eBooks π
Mobile Apps π±
Archives (ZIP/ISO) πΏ
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Prime Numbers and Computer Methods for Factorization (2012) - Riesel.pdf.gz
Home
/
Discover
/
www.kgay4all.com
/
Books
/
library--
/
cryptography & mathematics
/
Parent Folder
Prime Numbers and Computer Methods for Factorization (2012) - Riesel.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
Prime Numbers and Computer Methods for Factorization (1994) - Riesel.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
Princeton COS 507D Advanced Topics in Computer Science: A Theorist's Toolkit (Fall 2002) - Arora.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing (2012) - Camenisch, Lysyanskaya, Neven.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
Quaternion Algebras.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Practical Multilinear Map over the Integers (2013) - Coroni, Lepoint, Tibouchi.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Ratcheted Encryption and Key Exchange: The Security of Messaging (2016) - Bellare, Singh, Jaeger, Nyayapati, Stepanovs.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Rational Curves on a K3 Surface (2009) - Elkies.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Polynomial Evaluation and Message Authentication (2007) - Bernstein.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
OpenPGP-based Financial Instruments and Dispute Arbitration (2008) - Nagy, Shakel.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
Scalable Mechanisms for Rational Secret Sharing (2012) - Movahedi, Dani, Saia.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE) (2015) - Devadas, Dijk, Fletcher, Ren.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
One-Round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability (2011) - Cremers, Feltz.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Short Programs for Functions on Curves (1986) - Miller.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Structure Preserving Signatures and Commitments to Group Elements (2010) - Abel, Fuchsbauer, Groth, Haralambiev, Ohkubo.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
On The Design and Security of RC2 (1998) - Knudsen, Rijmen, Rivest, Robshaw.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Tahoe: The Least-Authority Filesystem (2008) - Wilcox-OβHearn, Warner.pdf.gz
GZ
2 years ago
Get Size
Copy Link
On Splitting a Point with Summation Polynomials in Binary Elliptic Curves (2016) - Courtois.pdf.gz
GZ
2 years ago
Get Size
Copy Link
The Brave New World of Bodacious Assumptions in Cryptography (2010) - Koblitz, Menezes.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Obfuscating Circuits via Composite-Order Graded Encoding (2015) - Applebaum, Brakerski.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.