alt text

alt text


Contact Us

alt text

Our Location

alt text

How Can We Help?


Showing 5 Results, Digital:5, Print: 0

Showing Page No. 1 , Digital:5, Print: 0

Certifying cryptographic tools

By Bellare, M.
101., ()

Subject: Advances in Cryptology - Crypto '92; Lecture Notes in Computer Science Volume 740; non-interactive proofs; trapdoors; zero knowledge
Availability: 1 of 1(eBook)
Read More

Collision-Resistant Hashing

By Bellare, M.
101., ()

Subject: Advances in Cryptology - Crypto '97; Lecture Notes in Computer Science Volume 1294; collision intractibility; universal one-way hash function
Availability: 1 of 1(eBook)
Read More

Entity authentication and key distribution

By Bellare, M.
101., ()

Subject: Advances in Cryptology - Crypto '93; Lecture Notes in Computer Science Volume 773; authentication; identification schemes; key exchange
Availability: 1 of 1(eBook)
Read More

Incremental cryptography

By Bellare, M., Goldreich, O.
101., ()

Subject: Advances in Cryptology - Crypto '94; Lecture Notes in Computer Science Volume 839; incremental hashing
Availability: 1 of 1(eBook)
Read More

The exact security of digital signatures how to sign with RSA and Rabin

By Bellare, M.
101., ()

Subject: Advances in Cryptology - EuroCrypt '96; Lecture Notes in Computer Science Volume 1070; digital signatures; RSA
Availability: 1 of 1(eBook)
Read More

<< Prev Next >>
                                                              
Most Viewed View All