Index of /tech/cryptography & mathematics

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[DIR]zero knowledge/2023-08-25 22:25 -  
[DIR]visual cryptography/2023-08-25 22:25 -  
[DIR]supersingular isogeny/2023-08-25 22:25 -  
[DIR]stream ciphers/2023-08-25 22:25 -  
[DIR]standards/2023-08-25 22:25 -  
[DIR]signature schemes/2023-08-25 22:25 -  
[DIR]side channels/2023-08-25 22:25 -  
[DIR]security models/2023-08-25 22:25 -  
[DIR]secret sharing/2023-08-25 22:25 -  
[DIR]rsa/2023-08-25 22:25 -  
[DIR]rank-based cryptography/2023-08-25 22:25 -  
[DIR]random number generators/2023-08-25 22:25 -  
[DIR]quaternions/2023-08-25 22:25 -  
[DIR]quantum cryptography/2023-08-25 22:25 -  
[DIR]quantum algorithms & cryptanalysis/2023-08-25 22:25 -  
[DIR]private information retrieval/2023-08-25 22:25 -  
[DIR]post-quantum cryptography/2023-08-25 22:25 -  
[DIR]patents/2023-08-25 22:25 -  
[DIR]pairing-based cryptography/2023-08-25 22:25 -  
[DIR]otr/2023-08-25 22:25 -  
[DIR]oblivious transfer/2023-08-25 22:25 -  
[DIR]number theory/2023-08-25 22:25 -  
[DIR]mqv/2023-08-25 22:24 -  
[DIR]lattice-based cryptography/2023-08-25 22:24 -  
[DIR]knot theory/2023-08-25 22:24 -  
[DIR]isogeny-based cryptography/2023-08-25 22:24 -  
[DIR]ibe/2023-08-25 22:24 -  
[DIR]hyperelliptic/2023-08-25 22:24 -  
[DIR]hashes/2023-08-25 22:24 -  
[DIR]fully homomorphic encryption/2023-08-25 22:24 -  
[DIR]elliptic curve cryptography/2023-08-25 22:24 -  
[DIR]elgamal/2023-08-25 22:24 -  
[DIR]differential cryptanalysis/2023-08-25 22:24 -  
[DIR]cryptocurrencies/2023-08-25 22:24 -  
[DIR]camellia/2023-08-25 22:24 -  
[DIR]block ciphers/2023-08-25 22:24 -  
[DIR]authenticated encryption/2023-08-25 22:24 -  
[DIR]attribute-based encryption/2023-08-25 22:24 -  
[DIR]anonymous credentials/2023-08-25 22:24 -  
[DIR]algebra/2023-08-25 22:24 -  
[   ]What is the smallest prime? (2012) - Caldwell, Xiong.pdf2023-08-25 22:24 2.2M 
[   ]What is the Monster? (2002) - AMS.pdf2023-08-25 22:24 53K 
[   ]What is a Syzygy? (2006) - AMS.pdf2023-08-25 22:24 59K 
[   ]Two Practical and Provably Secure Block Ciphers: BEAR and LION (1996) - Anderson, Biham.pdf2023-08-25 22:24 306K 
[   ]Two-Party Generation of DSA Signatures (2001) - MacKenzie, Reiter.pdf2023-08-25 22:24 236K 
[   ]Time-lock Puzzles and timed-release Crypto (1996) - Rivest, Shamir, Wagner.pdf2023-08-25 22:24 121K 
[   ]The Uneasy Relationship Between Mathematics and Cryptography (2007) - Koblitz.pdf2023-08-25 22:24 204K 
[   ]The Poly1305-AES message-authentication code (2005) - Bernstein.pdf2023-08-25 22:24 1.4M 
[   ]The Number Field Sieve for Integers of Low Weight (2010) - Shirokauer.pdf2023-08-25 22:24 261K 
[   ]The Moral Character of Cryptographic Work (2015) - Rogaway.pdf2023-08-25 22:24 440K 
[   ]The Design and Implementation of Datagram TLS (2004) - Modadugu, Rescorla.pdf2023-08-25 22:24 194K 
[   ]The Decision Diffie-Hellman Problem (1998) - Boneh.pdf2023-08-25 22:24 246K 
[   ]The Brave New World of Bodacious Assumptions in Cryptography (2010) - Koblitz, Menezes.pdf2023-08-25 22:24 191K 
[   ]Tahoe: The Least-Authority Filesystem (2008) - Wilcox-O’Hearn, Warner.pdf2023-08-25 22:24 269K 
[   ]Structure Preserving Signatures and Commitments to Group Elements (2010) - Abel, Fuchsbauer, Groth, Haralambiev, Ohkubo.pdf2023-08-25 22:24 310K 
[   ]Short Programs for Functions on Curves (1986) - Miller.pdf2023-08-25 22:24 97K 
[   ]Scalable Mechanisms for Rational Secret Sharing (2012) - Movahedi, Dani, Saia.pdf2023-08-25 22:24 649K 
[DIR]Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy - Brands/2023-08-25 22:24 -  
[   ]Rational Curves on a K3 Surface (2009) - Elkies.pdf2023-08-25 22:24 4.4M 
[   ]Ratcheted Encryption and Key Exchange: The Security of Messaging (2016) - Bellare, Singh, Jaeger, Nyayapati, Stepanovs.pdf2023-08-25 22:24 212K 
[   ]Quaternion Algebras.pdf2023-08-25 22:24 355K 
[   ]Princeton COS 507D Advanced Topics in Computer Science: A Theorist's Toolkit (Fall 2002) - Arora.pdf2023-08-25 22:24 1.2M 
[   ]Prime Numbers and Computer Methods for Factorization (2012) - Riesel.pdf2023-08-25 22:24 15M 
[   ]Prime Numbers and Computer Methods for Factorization (1994) - Riesel.pdf2023-08-25 22:24 40M 
[   ]Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing (2012) - Camenisch, Lysyanskaya, Neven.pdf2023-08-25 22:24 368K 
[   ]Practical Multilinear Map over the Integers (2013) - Coroni, Lepoint, Tibouchi.pdf2023-08-25 22:24 467K 
[   ]Polynomial Evaluation and Message Authentication (2007) - Bernstein.pdf2023-08-25 22:24 261K 
[   ]OpenPGP-based Financial Instruments and Dispute Arbitration (2008) - Nagy, Shakel.pdf2023-08-25 22:24 136K 
[   ]Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE) (2015) - Devadas, Dijk, Fletcher, Ren.pdf2023-08-25 22:24 519K 
[   ]One-Round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability (2011) - Cremers, Feltz.pdf2023-08-25 22:24 466K 
[   ]On The Design and Security of RC2 (1998) - Knudsen, Rijmen, Rivest, Robshaw.pdf2023-08-25 22:24 156K 
[   ]On Splitting a Point with Summation Polynomials in Binary Elliptic Curves (2016) - Courtois.pdf2023-08-25 22:24 262K 
[   ]Obfuscating Circuits via Composite-Order Graded Encoding (2015) - Applebaum, Brakerski.pdf2023-08-25 22:24 542K 
[   ]Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing [Pedersen Commitment Scheme] (1989) - Pedersen.pdf2023-08-25 22:24 643K 
[   ]New Definitions and Separations for Circular Security (2012) - Cash, Green, Hohenberger.pdf2023-08-25 22:24 309K 
[   ]New Algorithm for the Discrete Logarithm Problem on Elliptic Curves (2015) - Semaev.pdf2023-08-25 22:24 265K 
[   ]NaCl: The security impact of a new cryptographic library (2012) - Bernstein, Lange, Schwabe.pdf2023-08-25 22:24 292K 
[   ]Multiparty Computation with Faulty Majority (1990) - Beaver, Goldwasser.pdf2023-08-25 22:24 569K 
[   ]Modular Polynomials via Isogeny Volcanoes (2012) - Bröker, Lauter, Sutherland.pdf2023-08-25 22:24 377K 
[   ]Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices (2012) - Henninger, Durumeric, Wustrow, Halderman.pdf2023-08-25 22:24 489K 
[TXT]Mimic Functions - Peter Wagner.txt2023-08-25 22:24 43K 
[   ]Message Authentication, Revisited (2012) - Dodis, Kiltz, Pietrzak, Wichs.pdf2023-08-25 22:24 364K 
[   ]Mathematics Made Difficult (1972) - Linderholm.pdf2023-08-25 22:24 544K 
[   ]Lattices [mathemetical definitions] (2002) - Brouwer.pdf2023-08-25 22:24 259K 
[   ]LUKS On-Disk Format Specification Version 1.1.1 (2008).pdf2023-08-25 22:24 130K 
[   ]Kummer Strikes Back: New DH Speed Records (2014) - Bernstein, Lange, et. al.pdf2023-08-25 22:24 421K 
[   ]Kolmogorov Complexity and Its Applications [slides] (2009) - Ming Li.pdf2023-08-25 22:24 629K 
[   ]Kolmogorov Complexity, Circuits, and the Strength of Formal Theories of Arithmetic (2013) - Davie, Friedman, Hopkins, Tzameret.pdf2023-08-25 22:24 232K 
[   ]Keeping Authorities Honest-or-Bust with Decentralized Witness Cosigning (2015) - Syta, Tamas, Jovanovic, Gasser, Gailly, Khoffi, Ford, Visher, Wolisky.pdf2023-08-25 22:24 672K 
[   ]Introduction to Twin Primes and Brun's Constant Computation (2002) - Sebah, Gourdon.pdf2023-08-25 22:24 156K 
[   ]Insecurity Against Selective-Opening Attacks: Some Key Ideas (2012) - Mouradian.pdf2023-08-25 22:24 61K 
[   ]Inner Product Spaces (2007) - Lankham, Nactergaele, Schilling.pdf2023-08-25 22:24 301K 
[   ]Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice (2015) - Adrian, Bhargavan, Durumeric, Gaudry, Green, Halderman, Heninger, Springall, Thomé, Valenta, VanderSloot, Wustrow, Zanella-Béguelin, Zimmermann.pdf2023-08-25 22:24 1.3M 
[   ]Ideals, Varieties, and Algorithms (2015) - Cox, Little, OShea.pdf2023-08-25 22:24 4.9M 
[   ]How Secure is TextSecure? (2014) - Frosch, Mainka, Bader, Bergsma, Schwenk, Holz.pdf2023-08-25 22:24 1.0M 
[   ]Honey Encryption: Security Beyond the Brute-Force Bound (2014) - Juels.pdf2023-08-25 22:24 269K 
[   ]Homomorphic Trapdoor Commitments to Group Elements (2009) - Groth.pdf2023-08-25 22:24 340K 
[   ]Hierarchical Identity-Based Lossy Trapdoor Functions (2012) - Escala, Herranz, Libert, Ràfols.pdf2023-08-25 22:24 453K 
[DIR]Handbook of Applied Cryptography/2023-08-25 22:24 -  
[   ]Group Signature with Deniability: How to Disavow a Signature (2015) - Emura, Hanaoka, Sakai, Tanaka.pdf2023-08-25 22:24 180K 
[   ]Gröbner Bases, Coding, and Cryptography (2009) - Sala, Mora, Perret, Sakata, Traverso.pdf2023-08-25 22:24 5.7M 
[   ]Geometric Algebra with Applications in Science and Engineering (2001) - Hestenes, Corrochano, Sobczyk.pdf2023-08-25 22:24 19M 
[   ]Gaussian Random Number Generators (2007) - Thomas, Luk, Leong, Villasenor.pdf2023-08-25 22:24 417K 
[   ]From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security (2002) - Bellare et. al.pdf2023-08-25 22:24 318K 
[   ]Forward Secure Messaging from Puncturable Encryption (2015) - Green, Miers.pdf2023-08-25 22:24 512K 
[   ]Format Oracles on OpenPGP (2015) - Maury et. al.pdf2023-08-25 22:24 357K 
[   ]Finite Fields with Applications to Coding Theory, Cryptography, and Related Areas (2010) - Mullen, Stichtenoth, Tapia-Recillas.pdf2023-08-25 22:24 31M 
[   ]Finite Fields - Lange.pdf2023-08-25 22:24 212K 
[   ]Faster batch forgery identification (2012) - Bernstein, Doumen, Lange, Oosterwijk.pdf2023-08-25 22:24 412K 
[   ]Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms (2001) - Gallant, Lambert, Vanstone.pdf2023-08-25 22:24 135K 
[   ]Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems (2009) - Applebaum, Cash, Peikert, Sahai.pdf2023-08-25 22:24 373K 
[   ]Extensions to Chaum’s Blind Signature Scheme and OpenCoin Requirements - Dents, Wilds.pdf2023-08-25 22:24 132K 
[   ]Extending the Salsa20 Nonce (2011) - Bernstein.pdf2023-08-25 22:24 341K 
[   ]Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case? (2016) - Kim, Barbulescu.pdf2023-08-25 22:24 446K 
[   ]Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project (2009) - Camenisch et. al.pdf2023-08-25 22:24 538K 
[   ]Encryption Schemes Secure Against Selective Opening Attack (2008) - Bellare, Yilek.pdf2023-08-25 22:24 258K 
[   ]Efficient Non-interactive Proof Systems for Bilinear Groups (2008)[full] - Groth, Sahai.pdf2023-08-25 22:24 383K 
[   ]Efficient Non-interactive Proof Systems for Bilinear Groups (2008) - Groth, Sahai.pdf2023-08-25 22:24 263K 
[   ]Distributed Key Generation and Its Applications (2010) - Kate.pdf2023-08-25 22:24 2.1M 
[   ]Distance-Bounding Protocols (1994) - Brands, Chaum.pdf2023-08-25 22:24 212K 
[   ]Diffie-Hellmann Key Exchange Protocol and Non-Abelian Nilpotent Groups (2008) - Mahalonobis.pdf2023-08-25 22:24 275K 
[   ]Deterministic and Efficiently Searchable Encryption (2007) - Bellare, Boldyreva, O’Neill.pdf2023-08-25 22:24 444K 
[   ]Detecting Perfect Powers in Essentially Linear Time (1998) - Bernstein.pdf2023-08-25 22:24 455K 
[   ]Cryptography and Coding: 10th IMA International Conference Proceedings (2005) - Smart.pdf2023-08-25 22:24 6.3M 
[   ]Cryptography Made Simple (2016) - Smart.pdf2023-08-25 22:24 4.1M 
[   ]Cryptographic Sponge Functions (2011) - Bertoni, Daemen, Peeters, Van Assche.pdf2023-08-25 22:24 913K 
[   ]Cryptocat: Circumventing Internet Censorship Threats (2012) - Kobeissi.pdf2023-08-25 22:24 695K 
[   ]Cryptanalysis of Twofish (2000) - Shiho, Lin.pdf2023-08-25 22:24 212K 
[   ]Cryptanalysis of Iterated Block Ciphers [thesis] (1997) - Rijmen.pdf2023-08-25 22:24 1.0M 
[   ]Credential Authenticated Identification and Key Exchange (2010) - Camenisch, Casati, Gross, Shoup.pdf2023-08-25 22:24 589K 
[   ]Constructing Perfect Steganographic Systems (2011) - Ryabko, Ryabko.pdf2023-08-25 22:24 172K 
[   ]Computing on Authenticated Data (2011) - Ahn, Boneh, Camenisch, Hohenberger, shelat, Waters.pdf2023-08-25 22:24 370K 
[   ]Coda: Decentralized Cryptocurrency at Scale (2018) - Meckler, Shapiro.pdf2023-08-25 22:24 420K 
[   ]Cheating Prevention in Visual Cryptography (2007) - Hu, Tzeng.pdf2023-08-25 22:24 2.7M 
[   ]Charm: A Framework for Rapidly Prototyping Cryptosystems (2013) - Green.pdf2023-08-25 22:24 1.4M 
[   ]Candidate Multilinear Maps from Ideal Lattices (2013) - Garg, Gentry, Halevi.pdf2023-08-25 22:24 665K 
[   ]Bleichenbacher's Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption (2014) - Jager, Schinzel, Somorovsky.pdf2023-08-25 22:24 513K 
[   ]Batch Verification of Short Signatures (2011) - Camenisch, Hohenberger, Pedersen.pdf2023-08-25 22:24 274K 
[   ]Batch Binary Edwards (2009) - Bernstein.pdf2023-08-25 22:24 302K 
[   ]Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems (2002) - Cachin, Kursawe, Lysyanskaya, Strobl.pdf2023-08-25 22:24 210K 
[   ]Another Look at HMQV (2007) - Menezes.pdf2023-08-25 22:24 270K 
[   ]Another Look at "Provable Security" (2004) - Koblitz, Menezes.pdf2023-08-25 22:24 439K 
[   ]An Introduction to Mathematical Cryptography (2014) - Hoffstein, Pipher, Silverman.pdf2023-08-25 22:24 5.7M 
[   ]An Efficient Group Key Management Using Code for Key Calculation for Simultaneous Join Leave: CKCS (2012) - Hajyvahabzadeh et. al.pdf2023-08-25 22:24 329K 
[DIR]Advances in Cryptology/2023-08-25 22:24 -  
[   ]A Security Analysis of the Composition of ChaCha20 and Poly1305 (2014) - Procter.pdf2023-08-25 22:24 329K 
[   ]A Secret Sharing Scheme Based on Group Presentations and the Word Problem (2012) - Habeeb, Kahrobaei, Shpilrain.pdf2023-08-25 22:24 129K 
[   ]A Scalable and Unifed Multiplier Architecture for Finite Fields GF(p) and GF(2m) (2000) - Savaş, Tenca, Koç.pdf2023-08-25 22:24 542K 
[   ]A Riddle Wrapped in an Enigma (2015) - Koblitz, Menezes.pdf2023-08-25 22:24 203K 
[   ]A Novel Chaotic Encryption Scheme Based on Pseudorandom Bit Padding (2012) - Ahadpour, Fard, Sadra.pdf2023-08-25 22:24 297K 
[   ]A Note on the Circular Complex Centered Form (1983) - Rokne, Wu.pdf2023-08-25 22:24 335K 
[   ]A Kilobit Hidden SNFS Discrete Logarithm Computation (2016) - Fried, Gaudry, Heninger, Thomé.pdf2023-08-25 22:24 599K 
[   ]A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroup (1997) - Lim, Lee.pdf2023-08-25 22:24 253K 
[   ]A Fair and Efficient Solution to the Socialist Millionaires' Problem (2001) - Boudot et. al.pdf2023-08-25 22:24 198K 
[   ]A Cryptographic Framework for the Controlled Release Of Certified Data (2006) - Bangeter, Camenisch, Lysyanskaya.pdf2023-08-25 22:24 262K 
[   ]12th International Workshop on Computer Security Protocols (2004).pdf2023-08-25 22:24 3.6M 

Apache/2.4.59 (Debian) Server at idouzi.info Port 80