Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2967
search results - page 3 / 594
»
Cryptology
Sort
relevance
views
votes
recent
update
View
thumb
title
25
click to vote
CODCRY
2009
Springer
133
views
Cryptology
»
more
CODCRY 2009
»
On Cayley Graphs, Surface Codes, and the Limits of Homological Coding for Quantum Error Correction
14 years 3 months ago
Download
www.math.u-bordeaux.fr
Gilles Zémor
claim paper
Read More »
30
click to vote
CRYPTO
2009
Springer
156
views
Cryptology
»
more
CRYPTO 2009
»
How to Hash into Elliptic Curves
14 years 3 months ago
Download
www.iacr.org
Thomas Icart
claim paper
Read More »
27
click to vote
AFRICACRYPT
2008
Springer
126
views
Cryptology
»
more
AFRICACRYPT 2008
»
The Psychology of Security
14 years 2 months ago
Download
www.schneier.com
Bruce Schneier
claim paper
Read More »
24
click to vote
AFRICACRYPT
2008
Springer
179
views
Cryptology
»
more
AFRICACRYPT 2008
»
New Definition of Density on Knapsack Cryptosystems
14 years 2 months ago
Download
www.math.unicaen.fr
Noboru Kunihiro
claim paper
Read More »
20
click to vote
AFRICACRYPT
2008
Springer
94
views
Cryptology
»
more
AFRICACRYPT 2008
»
Stream Ciphers Using a Random Update Function: Study of the Entropy of the Inner State
14 years 2 months ago
Download
www.math.unicaen.fr
Andrea Röck
claim paper
Read More »
« Prev
« First
page 3 / 594
Last »
Next »