Works best with JavaScript enabled!Works best in modern browsers!powered by h5ai
NameLast modifiedSize
folder-parentParent Directory
fileA Decade of Lattice Cryptography.pdf2021-04-18 08:59703 KB
fileAbe M., Okamoto T. - A Signature Scheme with Message Recovery as Secure as Discrete Logarithm.pdf2021-04-18 08:59182 KB
fileAbe-Okamoto signature scheme.pdf2021-04-18 08:5988 KB
fileBaqer K., Distributed Payment Systems.pdf2021-04-18 08:592432 KB
fileDiscovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks.pdf2021-04-18 08:593934 KB
fileElliptic Curve Cryptography.pdf2021-04-18 08:59514 KB
fileFredriksson B., A case study in smartcard security - Analysing Mifare Classic.pdf2021-04-18 08:59672 KB
fileFredriksson B., A Distributed Public Key Infrastructure for the Web Backed by a Blockchain.pdf2021-04-18 08:592359 KB
fileFredriksson B., Lundberg E., The Monk Problem.pdf2021-04-18 08:591128 KB
fileIt Makes no Difference Whether or Not I Do It.pdf2021-04-18 08:592572 KB
fileMandelbrot.html2021-04-18 08:590 KB
fileRIO reference manual.pdf2021-04-18 08:59812 KB
fileSHA-256.pdf2021-04-18 08:5985 KB
fileStehlé D., Steinfeld R. - Making NTRU as Secure as Worst-Case Problems over Ideal Lattices.pdf2021-04-18 08:59429 KB
fileWijaya D. A., Anonymity in Bitcoin.pdf2021-04-18 08:592011 KB
fileww2.html2021-04-18 08:590 KB