![[ICO]](/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](/icons/back.gif) | Parent Directory | | - | |
![[ ]](/icons/layout.gif) | 12th International Workshop on Computer Security Protocols (2004).pdf | 2023-08-25 22:24 | 3.6M | |
![[ ]](/icons/layout.gif) | A Cryptographic Framework for the Controlled Release Of Certified Data (2006) - Bangeter, Camenisch, Lysyanskaya.pdf | 2023-08-25 22:24 | 262K | |
![[ ]](/icons/layout.gif) | A Fair and Efficient Solution to the Socialist Millionaires' Problem (2001) - Boudot et. al.pdf | 2023-08-25 22:24 | 198K | |
![[ ]](/icons/layout.gif) | A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroup (1997) - Lim, Lee.pdf | 2023-08-25 22:24 | 253K | |
![[ ]](/icons/layout.gif) | A Kilobit Hidden SNFS Discrete Logarithm Computation (2016) - Fried, Gaudry, Heninger, Thomé.pdf | 2023-08-25 22:24 | 599K | |
![[ ]](/icons/layout.gif) | A Note on the Circular Complex Centered Form (1983) - Rokne, Wu.pdf | 2023-08-25 22:24 | 335K | |
![[ ]](/icons/layout.gif) | A Novel Chaotic Encryption Scheme Based on Pseudorandom Bit Padding (2012) - Ahadpour, Fard, Sadra.pdf | 2023-08-25 22:24 | 297K | |
![[ ]](/icons/layout.gif) | A Riddle Wrapped in an Enigma (2015) - Koblitz, Menezes.pdf | 2023-08-25 22:24 | 203K | |
![[ ]](/icons/layout.gif) | A Scalable and Unifed Multiplier Architecture for Finite Fields GF(p) and GF(2m) (2000) - Savaş, Tenca, Koç.pdf | 2023-08-25 22:24 | 542K | |
![[ ]](/icons/layout.gif) | A Secret Sharing Scheme Based on Group Presentations and the Word Problem (2012) - Habeeb, Kahrobaei, Shpilrain.pdf | 2023-08-25 22:24 | 129K | |
![[ ]](/icons/layout.gif) | A Security Analysis of the Composition of ChaCha20 and Poly1305 (2014) - Procter.pdf | 2023-08-25 22:24 | 329K | |
![[DIR]](/icons/folder.gif) | Advances in Cryptology/ | 2023-08-25 22:24 | - | |
![[ ]](/icons/layout.gif) | An Efficient Group Key Management Using Code for Key Calculation for Simultaneous Join Leave: CKCS (2012) - Hajyvahabzadeh et. al.pdf | 2023-08-25 22:24 | 329K | |
![[ ]](/icons/layout.gif) | An Introduction to Mathematical Cryptography (2014) - Hoffstein, Pipher, Silverman.pdf | 2023-08-25 22:24 | 5.7M | |
![[ ]](/icons/layout.gif) | Another Look at "Provable Security" (2004) - Koblitz, Menezes.pdf | 2023-08-25 22:24 | 439K | |
![[ ]](/icons/layout.gif) | Another Look at HMQV (2007) - Menezes.pdf | 2023-08-25 22:24 | 270K | |
![[ ]](/icons/layout.gif) | Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems (2002) - Cachin, Kursawe, Lysyanskaya, Strobl.pdf | 2023-08-25 22:24 | 210K | |
![[ ]](/icons/layout.gif) | Batch Binary Edwards (2009) - Bernstein.pdf | 2023-08-25 22:24 | 302K | |
![[ ]](/icons/layout.gif) | Batch Verification of Short Signatures (2011) - Camenisch, Hohenberger, Pedersen.pdf | 2023-08-25 22:24 | 274K | |
![[ ]](/icons/layout.gif) | Bleichenbacher's Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption (2014) - Jager, Schinzel, Somorovsky.pdf | 2023-08-25 22:24 | 513K | |
![[ ]](/icons/layout.gif) | Candidate Multilinear Maps from Ideal Lattices (2013) - Garg, Gentry, Halevi.pdf | 2023-08-25 22:24 | 665K | |
![[ ]](/icons/layout.gif) | Charm: A Framework for Rapidly Prototyping Cryptosystems (2013) - Green.pdf | 2023-08-25 22:24 | 1.4M | |
![[ ]](/icons/layout.gif) | Cheating Prevention in Visual Cryptography (2007) - Hu, Tzeng.pdf | 2023-08-25 22:24 | 2.7M | |
![[ ]](/icons/layout.gif) | Coda: Decentralized Cryptocurrency at Scale (2018) - Meckler, Shapiro.pdf | 2023-08-25 22:24 | 420K | |
![[ ]](/icons/layout.gif) | Computing on Authenticated Data (2011) - Ahn, Boneh, Camenisch, Hohenberger, shelat, Waters.pdf | 2023-08-25 22:24 | 370K | |
![[ ]](/icons/layout.gif) | Constructing Perfect Steganographic Systems (2011) - Ryabko, Ryabko.pdf | 2023-08-25 22:24 | 172K | |
![[ ]](/icons/layout.gif) | Credential Authenticated Identification and Key Exchange (2010) - Camenisch, Casati, Gross, Shoup.pdf | 2023-08-25 22:24 | 589K | |
![[ ]](/icons/layout.gif) | Cryptanalysis of Iterated Block Ciphers [thesis] (1997) - Rijmen.pdf | 2023-08-25 22:24 | 1.0M | |
![[ ]](/icons/layout.gif) | Cryptanalysis of Twofish (2000) - Shiho, Lin.pdf | 2023-08-25 22:24 | 212K | |
![[ ]](/icons/layout.gif) | Cryptocat: Circumventing Internet Censorship Threats (2012) - Kobeissi.pdf | 2023-08-25 22:24 | 695K | |
![[ ]](/icons/layout.gif) | Cryptographic Sponge Functions (2011) - Bertoni, Daemen, Peeters, Van Assche.pdf | 2023-08-25 22:24 | 913K | |
![[ ]](/icons/layout.gif) | Cryptography Made Simple (2016) - Smart.pdf | 2023-08-25 22:24 | 4.1M | |
![[ ]](/icons/layout.gif) | Cryptography and Coding: 10th IMA International Conference Proceedings (2005) - Smart.pdf | 2023-08-25 22:24 | 6.3M | |
![[ ]](/icons/layout.gif) | Detecting Perfect Powers in Essentially Linear Time (1998) - Bernstein.pdf | 2023-08-25 22:24 | 455K | |
![[ ]](/icons/layout.gif) | Deterministic and Efficiently Searchable Encryption (2007) - Bellare, Boldyreva, O’Neill.pdf | 2023-08-25 22:24 | 444K | |
![[ ]](/icons/layout.gif) | Diffie-Hellmann Key Exchange Protocol and Non-Abelian Nilpotent Groups (2008) - Mahalonobis.pdf | 2023-08-25 22:24 | 275K | |
![[ ]](/icons/layout.gif) | Distance-Bounding Protocols (1994) - Brands, Chaum.pdf | 2023-08-25 22:24 | 212K | |
![[ ]](/icons/layout.gif) | Distributed Key Generation and Its Applications (2010) - Kate.pdf | 2023-08-25 22:24 | 2.1M | |
![[ ]](/icons/layout.gif) | Efficient Non-interactive Proof Systems for Bilinear Groups (2008) - Groth, Sahai.pdf | 2023-08-25 22:24 | 263K | |
![[ ]](/icons/layout.gif) | Efficient Non-interactive Proof Systems for Bilinear Groups (2008)[full] - Groth, Sahai.pdf | 2023-08-25 22:24 | 383K | |
![[ ]](/icons/layout.gif) | Encryption Schemes Secure Against Selective Opening Attack (2008) - Bellare, Yilek.pdf | 2023-08-25 22:24 | 258K | |
![[ ]](/icons/layout.gif) | Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project (2009) - Camenisch et. al.pdf | 2023-08-25 22:24 | 538K | |
![[ ]](/icons/layout.gif) | Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case? (2016) - Kim, Barbulescu.pdf | 2023-08-25 22:24 | 446K | |
![[ ]](/icons/layout.gif) | Extending the Salsa20 Nonce (2011) - Bernstein.pdf | 2023-08-25 22:24 | 341K | |
![[ ]](/icons/layout.gif) | Extensions to Chaum’s Blind Signature Scheme and OpenCoin Requirements - Dents, Wilds.pdf | 2023-08-25 22:24 | 132K | |
![[ ]](/icons/layout.gif) | Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems (2009) - Applebaum, Cash, Peikert, Sahai.pdf | 2023-08-25 22:24 | 373K | |
![[ ]](/icons/layout.gif) | Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms (2001) - Gallant, Lambert, Vanstone.pdf | 2023-08-25 22:24 | 135K | |
![[ ]](/icons/layout.gif) | Faster batch forgery identification (2012) - Bernstein, Doumen, Lange, Oosterwijk.pdf | 2023-08-25 22:24 | 412K | |
![[ ]](/icons/layout.gif) | Finite Fields - Lange.pdf | 2023-08-25 22:24 | 212K | |
![[ ]](/icons/layout.gif) | Finite Fields with Applications to Coding Theory, Cryptography, and Related Areas (2010) - Mullen, Stichtenoth, Tapia-Recillas.pdf | 2023-08-25 22:24 | 31M | |
![[ ]](/icons/layout.gif) | Format Oracles on OpenPGP (2015) - Maury et. al.pdf | 2023-08-25 22:24 | 357K | |
![[ ]](/icons/layout.gif) | Forward Secure Messaging from Puncturable Encryption (2015) - Green, Miers.pdf | 2023-08-25 22:24 | 512K | |
![[ ]](/icons/layout.gif) | From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security (2002) - Bellare et. al.pdf | 2023-08-25 22:24 | 318K | |
![[ ]](/icons/layout.gif) | Gaussian Random Number Generators (2007) - Thomas, Luk, Leong, Villasenor.pdf | 2023-08-25 22:24 | 417K | |
![[ ]](/icons/layout.gif) | Geometric Algebra with Applications in Science and Engineering (2001) - Hestenes, Corrochano, Sobczyk.pdf | 2023-08-25 22:24 | 19M | |
![[ ]](/icons/layout.gif) | Gröbner Bases, Coding, and Cryptography (2009) - Sala, Mora, Perret, Sakata, Traverso.pdf | 2023-08-25 22:24 | 5.7M | |
![[ ]](/icons/layout.gif) | Group Signature with Deniability: How to Disavow a Signature (2015) - Emura, Hanaoka, Sakai, Tanaka.pdf | 2023-08-25 22:24 | 180K | |
![[DIR]](/icons/folder.gif) | Handbook of Applied Cryptography/ | 2023-08-25 22:24 | - | |
![[ ]](/icons/layout.gif) | Hierarchical Identity-Based Lossy Trapdoor Functions (2012) - Escala, Herranz, Libert, Ràfols.pdf | 2023-08-25 22:24 | 453K | |
![[ ]](/icons/layout.gif) | Homomorphic Trapdoor Commitments to Group Elements (2009) - Groth.pdf | 2023-08-25 22:24 | 340K | |
![[ ]](/icons/layout.gif) | Honey Encryption: Security Beyond the Brute-Force Bound (2014) - Juels.pdf | 2023-08-25 22:24 | 269K | |
![[ ]](/icons/layout.gif) | How Secure is TextSecure? (2014) - Frosch, Mainka, Bader, Bergsma, Schwenk, Holz.pdf | 2023-08-25 22:24 | 1.0M | |
![[ ]](/icons/layout.gif) | Ideals, Varieties, and Algorithms (2015) - Cox, Little, OShea.pdf | 2023-08-25 22:24 | 4.9M | |
![[ ]](/icons/layout.gif) | Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice (2015) - Adrian, Bhargavan, Durumeric, Gaudry, Green, Halderman, Heninger, Springall, Thomé, Valenta, VanderSloot, Wustrow, Zanella-Béguelin, Zimmermann.pdf | 2023-08-25 22:24 | 1.3M | |
![[ ]](/icons/layout.gif) | Inner Product Spaces (2007) - Lankham, Nactergaele, Schilling.pdf | 2023-08-25 22:24 | 301K | |
![[ ]](/icons/layout.gif) | Insecurity Against Selective-Opening Attacks: Some Key Ideas (2012) - Mouradian.pdf | 2023-08-25 22:24 | 61K | |
![[ ]](/icons/layout.gif) | Introduction to Twin Primes and Brun's Constant Computation (2002) - Sebah, Gourdon.pdf | 2023-08-25 22:24 | 156K | |
![[ ]](/icons/layout.gif) | Keeping Authorities Honest-or-Bust with Decentralized Witness Cosigning (2015) - Syta, Tamas, Jovanovic, Gasser, Gailly, Khoffi, Ford, Visher, Wolisky.pdf | 2023-08-25 22:24 | 672K | |
![[ ]](/icons/layout.gif) | Kolmogorov Complexity, Circuits, and the Strength of Formal Theories of Arithmetic (2013) - Davie, Friedman, Hopkins, Tzameret.pdf | 2023-08-25 22:24 | 232K | |
![[ ]](/icons/layout.gif) | Kolmogorov Complexity and Its Applications [slides] (2009) - Ming Li.pdf | 2023-08-25 22:24 | 629K | |
![[ ]](/icons/layout.gif) | Kummer Strikes Back: New DH Speed Records (2014) - Bernstein, Lange, et. al.pdf | 2023-08-25 22:24 | 421K | |
![[ ]](/icons/layout.gif) | LUKS On-Disk Format Specification Version 1.1.1 (2008).pdf | 2023-08-25 22:24 | 130K | |
![[ ]](/icons/layout.gif) | Lattices [mathemetical definitions] (2002) - Brouwer.pdf | 2023-08-25 22:24 | 259K | |
![[ ]](/icons/layout.gif) | Mathematics Made Difficult (1972) - Linderholm.pdf | 2023-08-25 22:24 | 544K | |
![[ ]](/icons/layout.gif) | Message Authentication, Revisited (2012) - Dodis, Kiltz, Pietrzak, Wichs.pdf | 2023-08-25 22:24 | 364K | |
![[TXT]](/icons/text.gif) | Mimic Functions - Peter Wagner.txt | 2023-08-25 22:24 | 43K | |
![[ ]](/icons/layout.gif) | Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices (2012) - Henninger, Durumeric, Wustrow, Halderman.pdf | 2023-08-25 22:24 | 489K | |
![[ ]](/icons/layout.gif) | Modular Polynomials via Isogeny Volcanoes (2012) - Bröker, Lauter, Sutherland.pdf | 2023-08-25 22:24 | 377K | |
![[ ]](/icons/layout.gif) | Multiparty Computation with Faulty Majority (1990) - Beaver, Goldwasser.pdf | 2023-08-25 22:24 | 569K | |
![[ ]](/icons/layout.gif) | NaCl: The security impact of a new cryptographic library (2012) - Bernstein, Lange, Schwabe.pdf | 2023-08-25 22:24 | 292K | |
![[ ]](/icons/layout.gif) | New Algorithm for the Discrete Logarithm Problem on Elliptic Curves (2015) - Semaev.pdf | 2023-08-25 22:24 | 265K | |
![[ ]](/icons/layout.gif) | New Definitions and Separations for Circular Security (2012) - Cash, Green, Hohenberger.pdf | 2023-08-25 22:24 | 309K | |
![[ ]](/icons/layout.gif) | Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing [Pedersen Commitment Scheme] (1989) - Pedersen.pdf | 2023-08-25 22:24 | 643K | |
![[ ]](/icons/layout.gif) | Obfuscating Circuits via Composite-Order Graded Encoding (2015) - Applebaum, Brakerski.pdf | 2023-08-25 22:24 | 542K | |
![[ ]](/icons/layout.gif) | On Splitting a Point with Summation Polynomials in Binary Elliptic Curves (2016) - Courtois.pdf | 2023-08-25 22:24 | 262K | |
![[ ]](/icons/layout.gif) | On The Design and Security of RC2 (1998) - Knudsen, Rijmen, Rivest, Robshaw.pdf | 2023-08-25 22:24 | 156K | |
![[ ]](/icons/layout.gif) | One-Round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability (2011) - Cremers, Feltz.pdf | 2023-08-25 22:24 | 466K | |
![[ ]](/icons/layout.gif) | Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE) (2015) - Devadas, Dijk, Fletcher, Ren.pdf | 2023-08-25 22:24 | 519K | |
![[ ]](/icons/layout.gif) | OpenPGP-based Financial Instruments and Dispute Arbitration (2008) - Nagy, Shakel.pdf | 2023-08-25 22:24 | 136K | |
![[ ]](/icons/layout.gif) | Polynomial Evaluation and Message Authentication (2007) - Bernstein.pdf | 2023-08-25 22:24 | 261K | |
![[ ]](/icons/layout.gif) | Practical Multilinear Map over the Integers (2013) - Coroni, Lepoint, Tibouchi.pdf | 2023-08-25 22:24 | 467K | |
![[ ]](/icons/layout.gif) | Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing (2012) - Camenisch, Lysyanskaya, Neven.pdf | 2023-08-25 22:24 | 368K | |
![[ ]](/icons/layout.gif) | Prime Numbers and Computer Methods for Factorization (1994) - Riesel.pdf | 2023-08-25 22:24 | 40M | |
![[ ]](/icons/layout.gif) | Prime Numbers and Computer Methods for Factorization (2012) - Riesel.pdf | 2023-08-25 22:24 | 15M | |
![[ ]](/icons/layout.gif) | Princeton COS 507D Advanced Topics in Computer Science: A Theorist's Toolkit (Fall 2002) - Arora.pdf | 2023-08-25 22:24 | 1.2M | |
![[ ]](/icons/layout.gif) | Quaternion Algebras.pdf | 2023-08-25 22:24 | 355K | |
![[ ]](/icons/layout.gif) | Ratcheted Encryption and Key Exchange: The Security of Messaging (2016) - Bellare, Singh, Jaeger, Nyayapati, Stepanovs.pdf | 2023-08-25 22:24 | 212K | |
![[ ]](/icons/layout.gif) | Rational Curves on a K3 Surface (2009) - Elkies.pdf | 2023-08-25 22:24 | 4.4M | |
![[DIR]](/icons/folder.gif) | Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy - Brands/ | 2023-08-25 22:24 | - | |
![[ ]](/icons/layout.gif) | Scalable Mechanisms for Rational Secret Sharing (2012) - Movahedi, Dani, Saia.pdf | 2023-08-25 22:24 | 649K | |
![[ ]](/icons/layout.gif) | Short Programs for Functions on Curves (1986) - Miller.pdf | 2023-08-25 22:24 | 97K | |
![[ ]](/icons/layout.gif) | Structure Preserving Signatures and Commitments to Group Elements (2010) - Abel, Fuchsbauer, Groth, Haralambiev, Ohkubo.pdf | 2023-08-25 22:24 | 310K | |
![[ ]](/icons/layout.gif) | Tahoe: The Least-Authority Filesystem (2008) - Wilcox-O’Hearn, Warner.pdf | 2023-08-25 22:24 | 269K | |
![[ ]](/icons/layout.gif) | The Brave New World of Bodacious Assumptions in Cryptography (2010) - Koblitz, Menezes.pdf | 2023-08-25 22:24 | 191K | |
![[ ]](/icons/layout.gif) | The Decision Diffie-Hellman Problem (1998) - Boneh.pdf | 2023-08-25 22:24 | 246K | |
![[ ]](/icons/layout.gif) | The Design and Implementation of Datagram TLS (2004) - Modadugu, Rescorla.pdf | 2023-08-25 22:24 | 194K | |
![[ ]](/icons/layout.gif) | The Moral Character of Cryptographic Work (2015) - Rogaway.pdf | 2023-08-25 22:24 | 440K | |
![[ ]](/icons/layout.gif) | The Number Field Sieve for Integers of Low Weight (2010) - Shirokauer.pdf | 2023-08-25 22:24 | 261K | |
![[ ]](/icons/layout.gif) | The Poly1305-AES message-authentication code (2005) - Bernstein.pdf | 2023-08-25 22:24 | 1.4M | |
![[ ]](/icons/layout.gif) | The Uneasy Relationship Between Mathematics and Cryptography (2007) - Koblitz.pdf | 2023-08-25 22:24 | 204K | |
![[ ]](/icons/layout.gif) | Time-lock Puzzles and timed-release Crypto (1996) - Rivest, Shamir, Wagner.pdf | 2023-08-25 22:24 | 121K | |
![[ ]](/icons/layout.gif) | Two-Party Generation of DSA Signatures (2001) - MacKenzie, Reiter.pdf | 2023-08-25 22:24 | 236K | |
![[ ]](/icons/layout.gif) | Two Practical and Provably Secure Block Ciphers: BEAR and LION (1996) - Anderson, Biham.pdf | 2023-08-25 22:24 | 306K | |
![[ ]](/icons/layout.gif) | What is a Syzygy? (2006) - AMS.pdf | 2023-08-25 22:24 | 59K | |
![[ ]](/icons/layout.gif) | What is the Monster? (2002) - AMS.pdf | 2023-08-25 22:24 | 53K | |
![[ ]](/icons/layout.gif) | What is the smallest prime? (2012) - Caldwell, Xiong.pdf | 2023-08-25 22:24 | 2.2M | |
![[DIR]](/icons/folder.gif) | algebra/ | 2023-08-25 22:24 | - | |
![[DIR]](/icons/folder.gif) | anonymous credentials/ | 2023-08-25 22:24 | - | |
![[DIR]](/icons/folder.gif) | attribute-based encryption/ | 2023-08-25 22:24 | - | |
![[DIR]](/icons/folder.gif) | authenticated encryption/ | 2023-08-25 22:24 | - | |
![[DIR]](/icons/folder.gif) | block ciphers/ | 2023-08-25 22:24 | - | |
![[DIR]](/icons/folder.gif) | camellia/ | 2023-08-25 22:24 | - | |
![[DIR]](/icons/folder.gif) | cryptocurrencies/ | 2023-08-25 22:24 | - | |
![[DIR]](/icons/folder.gif) | differential cryptanalysis/ | 2023-08-25 22:24 | - | |
![[DIR]](/icons/folder.gif) | elgamal/ | 2023-08-25 22:24 | - | |
![[DIR]](/icons/folder.gif) | elliptic curve cryptography/ | 2023-08-25 22:24 | - | |
![[DIR]](/icons/folder.gif) | fully homomorphic encryption/ | 2023-08-25 22:24 | - | |
![[DIR]](/icons/folder.gif) | hashes/ | 2023-08-25 22:24 | - | |
![[DIR]](/icons/folder.gif) | hyperelliptic/ | 2023-08-25 22:24 | - | |
![[DIR]](/icons/folder.gif) | ibe/ | 2023-08-25 22:24 | - | |
![[DIR]](/icons/folder.gif) | isogeny-based cryptography/ | 2023-08-25 22:24 | - | |
![[DIR]](/icons/folder.gif) | knot theory/ | 2023-08-25 22:24 | - | |
![[DIR]](/icons/folder.gif) | lattice-based cryptography/ | 2023-08-25 22:24 | - | |
![[DIR]](/icons/folder.gif) | mqv/ | 2023-08-25 22:24 | - | |
![[DIR]](/icons/folder.gif) | number theory/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | oblivious transfer/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | otr/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | pairing-based cryptography/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | patents/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | post-quantum cryptography/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | private information retrieval/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | quantum algorithms & cryptanalysis/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | quantum cryptography/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | quaternions/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | random number generators/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | rank-based cryptography/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | rsa/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | secret sharing/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | security models/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | side channels/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | signature schemes/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | standards/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | stream ciphers/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | supersingular isogeny/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | visual cryptography/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | zero knowledge/ | 2023-08-25 22:25 | - | |
|