Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
21
search results - page 1 / 5
»
crypto 2012
Sort
relevance
views
votes
recent
update
View
thumb
title
23
click to vote
CRYPTO
2012
Springer
216
views
Cryptology
»
more
CRYPTO 2012
»
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
11 years 10 months ago
Download
eprint.iacr.org
Zvika Brakerski
claim paper
Read More »
18
click to vote
CRYPTO
2012
Springer
217
views
Cryptology
»
more
CRYPTO 2012
»
Must You Know the Code of f to Securely Compute f?
11 years 10 months ago
Download
eprint.iacr.org
Mike Rosulek
claim paper
Read More »
25
click to vote
CRYPTO
2012
Springer
214
views
Cryptology
»
more
CRYPTO 2012
»
Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs
11 years 10 months ago
Download
www.ccs.neu.edu
Eric Miles, Emanuele Viola
claim paper
Read More »
19
click to vote
CRYPTO
2012
Springer
217
views
Cryptology
»
more
CRYPTO 2012
»
Multi-instance Security and Its Application to Password-Based Cryptography
11 years 10 months ago
Download
eprint.iacr.org
Mihir Bellare, Thomas Ristenpart, Stefano Tessaro
claim paper
Read More »
26
click to vote
BIRTHDAY
2012
Springer
268
views
Applied Computing
»
more
BIRTHDAY 2012
»
A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors
12 years 3 months ago
Download
www.cs.ucsb.edu
3-D integration presents many new opportunities for architects and embedded systems designers. However, 3-D integration has not yet been explored by the cryptographic hardware com...
Jonathan Valamehr, Ted Huffmire, Cynthia E. Irvine...
claim paper
Read More »
« Prev
« First
page 1 / 5
Last »
Next »