نتایج جستجو برای: cryptology

تعداد نتایج: 644  

2005
Jooyoung Lee Jongsung Kim Atsushi Takayasu Wenbin Zhang Fuyuki Kitagawa Takahiro Matsuda Goichiro Hanaoka Guizhen Zhu Zhongxiang Zheng Yosuke Todo Andrey Bogdanov Donghoon Chang Mohona Ghosh Rong Wang Ariano-Tim Donda Peter Samarin Jacek Samotyja Kerstin Lemke-Rust Xueqiang Wang Yuewu Wang Jiwu Jing Jiageng Chen Atsuko Miyaji Dong-Chan Kim Deukjo Hong Cheonshik Kim Jinsuk Baek Jongseok Choi Ratna Dutta

2000
Phong Q. Nguyen Jacques Stern

Lattices are regular arrangements of points in space, whose study appeared in the 19th century in both number theory and crystallography. The goal of lattice reduction is to nd useful representations of lattices. A major breakthrough in that eld occurred twenty years ago, with the appearance of Lovv asz's reduction algorithm, also known as LLL or L 3. Lattice reduction algorithms have since pro...

2006

security protocols 11th international workshop cambridge uk april 2-4 2003 revised selected papers lecture notes in computer science security and cryptology PDF

2012
Jonathan Zittrain

This talk will reflect on the core purposes of cryptology, and the extent to which those purposes are served – and servable – in today’s digital environment.

2008
Dario Catalano Ronald Cramer Ivan Damgard Giovanni Di Crescenzo David Pointcheval Tsuyoshi Takagi

The book here reviewed consists of several articles written by different authors. We provide below short characteristics of each of the articles in the book. 1. Efficient distributed computation modulo a shared secret (Dario Catalano) The article concerns the subject of distributed computation. This is realized by the secret sharing protocols. The author presents several kinds of such protocols...

2012
ATIF BIN MANSOOR

Internet is a widely used medium for transfer of information due to its reach and ease of availability. However, internet is an insecure medium and any information might be easily intercepted and viewed during its transfer. Different mechanisms like cryptology and steganography are adopted to secure the data communication over an inherently insecure medium like internet. Cryptology scrambles th...

2003
A. Bosselaers A. Biryukov J. Stern D. Catalano L. Granboulan P. Nguyen D. Pointcheval H. Dobbertin T. Lange P. Felke C. Paar H. Handschuh K. Nguyen P. P. Roelse S. Babbage M. Näslund H. Gilbert

This is the document identifying the problems faced by cryptographers and users of cryptology, either currently or in the short or medium term future.

2009

Follow up what we will offer in this article about progress in cryptology africacrypt 2009 second international conference on cryptology in africa gammarth tunisia june 21 25 2009 proceedings lecture notes in computer science. You know really that this book is coming as the best seller book today. So, when you are really a good reader or you're fans of the author, it does will be funny if you d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید