DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» SSS (cipher)
SSS (cipher)
Hash Functions from Sigma Protocols and Improvements to VSH
SSS) Operational Records, 2008-2016
Automated Malware Analysis Report for FAKE SSS ID-Pdf
Threshold Cryptography Based on Blakley Secret Sharing
VPC-SI System Administration Guide, Staros Release 21.20
Cryptography in Context
SSS-V2: Secure Similarity Search Hyun-A Park
Bestcrypt Container Encryption Help File
Progress on Cryptography
Chosen-Ciphertext Attacks Against MOSQUITO
Lightweight Password Hashing Scheme for Embedded Systems
Rocca: an Efficient AES-Based Encryption Scheme for Beyond 5G
Glossary of Abbreviations and Acronyms
VPC-DI System Administration Guide, Release 21.22
Optimal Asymmetric Data Encryption Algorithm
Analysis of Stream Cipher Based Authenticated Encryption Schemes
Time-Locked Encryption Made Practical
Improved Short Lattice Signatures in the Standard Model
Top View
RESCUE: Evaluation of a Fragmented Secret Share System in Distributed- Cloud Architecture
SSS Three Bridge Fiasco
5Th LACCEI International Latin American and Caribbean
PHC: the Candidates
Neutrality-Based Symmetric Cryptanalysis
BIS Quarterly Review, March 2020 Iii
FIPS 197, Advanced Encryption Standard (AES)
Download Article (PDF)
Algorithms and Data Structures for Automated Change Detection and Classification of Sidescan Sonar Imagery
Which Estream Ciphers Have Been Broken?
Bestcrypt Container Encryption Help File for Windows
Hash Functions from Sigma Protocols and Improvements to VSH
Independent Cryptographically Secure Sequences
The Pitfalls of Hashing for Privacy Levent Demir, Amrit Kumar, Mathieu Cunche, Cédric Lauradoux
Shamir Secret Sharing: How It Works and How to Implement It
A Fast New DES Implementation in Software
On the Performance of Provably Secure Hashing with Elliptic Curves
Protecting AES with Shamir's Secret Sharing Scheme⋆
Self-Synchronizing Stream Ciphers and Dynamical Systems: State of the Art and Open Issues Gilles Millérioux, Philippe Guillot
SSS in Cloud