Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2967
search results - page 3 / 594
»
Cryptology
Sort
relevance
views
votes
recent
update
View
thumb
title
103
Voted
CODCRY
2009
Springer
133
views
Cryptology
»
more
CODCRY 2009
»
On Cayley Graphs, Surface Codes, and the Limits of Homological Coding for Quantum Error Correction
15 years 9 months ago
Download
www.math.u-bordeaux.fr
Gilles Zémor
claim paper
Read More »
108
Voted
CRYPTO
2009
Springer
156
views
Cryptology
»
more
CRYPTO 2009
»
How to Hash into Elliptic Curves
15 years 9 months ago
Download
www.iacr.org
Thomas Icart
claim paper
Read More »
105
click to vote
AFRICACRYPT
2008
Springer
126
views
Cryptology
»
more
AFRICACRYPT 2008
»
The Psychology of Security
15 years 9 months ago
Download
www.schneier.com
Bruce Schneier
claim paper
Read More »
77
click to vote
AFRICACRYPT
2008
Springer
179
views
Cryptology
»
more
AFRICACRYPT 2008
»
New Definition of Density on Knapsack Cryptosystems
15 years 9 months ago
Download
www.math.unicaen.fr
Noboru Kunihiro
claim paper
Read More »
77
click to vote
AFRICACRYPT
2008
Springer
94
views
Cryptology
»
more
AFRICACRYPT 2008
»
Stream Ciphers Using a Random Update Function: Study of the Entropy of the Inner State
15 years 9 months ago
Download
www.math.unicaen.fr
Andrea Röck
claim paper
Read More »
« Prev
« First
page 3 / 594
Last »
Next »