Works best with JavaScript enabled!Works best in modern browsers!powered by h5ai
NameLast modifiedSize
folder-parentParent Directory
fileA Decade of Lattice Cryptography.pdf2016-04-13 05:19703 KB
fileAbe M., Okamoto T. - A Signature Scheme with Message Recovery as Secure as Discrete Logarithm.pdf2016-01-17 20:27182 KB
fileAbe-Okamoto signature scheme.pdf2016-01-17 20:2788 KB
fileBaqer K., Distributed Payment Systems.pdf2017-01-24 16:562432 KB
fileDiscovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks.pdf2016-12-08 11:153934 KB
fileElliptic Curve Cryptography.pdf2016-01-17 20:27514 KB
fileFredriksson B., A case study in smartcard security - Analysing Mifare Classic.pdf2017-07-31 15:19672 KB
fileFredriksson B., A Distributed Public Key Infrastructure for the Web Backed by a Blockchain.pdf2017-07-10 18:562359 KB
fileFredriksson B., Lundberg E., The Monk Problem.pdf2016-01-17 20:271128 KB
fileIt Makes no Difference Whether or Not I Do It.pdf2016-12-10 20:002572 KB
fileMandelbrot.html2016-01-17 20:270 KB
fileRIO reference manual.pdf2016-01-17 20:27812 KB
fileSHA-256.pdf2016-01-17 20:2785 KB
fileStehlé D., Steinfeld R. - Making NTRU as Secure as Worst-Case Problems over Ideal Lattices.pdf2016-04-13 05:19429 KB
fileWijaya D. A., Anonymity in Bitcoin.pdf2017-01-23 12:432011 KB
fileww2.html2016-01-17 20:270 KB