#public-key-cryptography

icon subthematics
Distributed Cryptography Distributed Password Public Key Cryptography
Category

Documents

Distributed Cryptography Distributed Password Public Key Cryptography

Xavier Boyen1

Distributed Cryptography Distributed Password Public Key Cryptography Alternate Text
Category

Documents

Etudes supérieures

Distributed Cryptography Distributed Password Public Key Cryptography

Xavier Boyen1

Book

36 pages

Flag

New Extensions of Pairing based Signatures into Universal Multi Designated Verifier Signatures
Category

Documents

New Extensions of Pairing based Signatures into Universal Multi Designated Verifier Signatures

Damien Vergnaud

New Extensions of Pairing based Signatures into Universal Multi Designated Verifier Signatures Alternate Text
Category

Documents

Rapports de stage

New Extensions of Pairing based Signatures into Universal Multi Designated Verifier Signatures

Damien Vergnaud

Book

20 pages

Flag

English

Reconstruction of Attacks against Cryptographic Protocols
Category

Documents

Reconstruction of Attacks against Cryptographic Protocols

Xavier Allamigeon

Reconstruction of Attacks against Cryptographic Protocols Alternate Text
Category

Documents

Etudes supérieures

Reconstruction of Attacks against Cryptographic Protocols

Xavier Allamigeon

Book

15 pages

Flag

English

Introduction to cryptographic protocols
Category

Documents

Introduction to cryptographic protocols

Bruno Blanchet

Introduction to cryptographic protocols Alternate Text
Category

Documents

Education

Introduction to cryptographic protocols

Bruno Blanchet

Book

14 pages

Flag

English

Rekeyed Digital Signature Schemes: Damage containment in the face of key exposure
Category

Documents

Rekeyed Digital Signature Schemes: Damage containment in the face of key exposure

Michel Abdalla

Rekeyed Digital Signature Schemes: Damage containment in the face of key exposure Alternate Text
Category

Documents

Annales d’examens et concours

Rekeyed Digital Signature Schemes: Damage containment in the face of key exposure

Michel Abdalla

Book

21 pages

Flag

English

Using Horn Clauses for Analyzing Security Protocols
Category

Documents

Using Horn Clauses for Analyzing Security Protocols

Bruno Blanchet

Using Horn Clauses for Analyzing Security Protocols Alternate Text
Category

Documents

Cours

Using Horn Clauses for Analyzing Security Protocols

Bruno Blanchet

Book

25 pages

Flag

English

Hybrid Coding: Encryption watermarking compression
Category

Documents

Hybrid Coding: Encryption watermarking compression

Owner

Hybrid Coding: Encryption watermarking compression Alternate Text
Category

Documents

Rapports de stage

Hybrid Coding: Encryption watermarking compression

Owner

Book

29 pages

Flag

English

Security Protocol Verification: Symbolic and Computational Models
Category

Documents

Security Protocol Verification: Symbolic and Computational Models

Bruno Blanchet

Security Protocol Verification: Symbolic and Computational Models Alternate Text
Category

Documents

Rapports de stage

Security Protocol Verification: Symbolic and Computational Models

Bruno Blanchet

Book

26 pages

Flag

English

  • 1
Alternate Text