alt text

alt text


Contact Us

alt text

Our Location

alt text

How Can We Help?


Showing 4 Results, Digital:4, Print: 0

Showing Page No. 1 , Digital:4, Print: 0

Algorithms for Black-Box Fields and Their Application to Cryptography

By Boneh, D.
101., ()

Subject: Advances in Cryptology - Crypto '96; Lecture Notes in Computer Science Volume 1109; relation to discrete logarithms; black box fields; Diffie-Hellman
Availability: 1 of 1(eBook)
Read More

Collusion-Secure Fingerprinting for Digital Data

By Boneh, D.
101., ()

Subject: Advances in Cryptology - Crypto '95; Lecture Notes in Computer Science Volume 963; fingerprinting
Availability: 1 of 1(eBook)
Read More

Efficient Generation of Shared RSA Keys

By Boneh, D.
101., ()

Subject: Advances in Cryptology - Crypto '97; Lecture Notes in Computer Science Volume 1294; shared key construction; key generation; RSA ; RSA
Availability: 1 of 1(eBook)
Read More

Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes

By Boneh, D.
101., ()

Subject: Advances in Cryptology - Crypto '96; Lecture Notes in Computer Science Volume 1109; bit security; of Diffie-Hellman; Diffie-Hellman
Availability: 1 of 1(eBook)
Read More

<< Prev Next >>
                                                              
Most Viewed View All