×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [security proofs]
1 Decoy State Quantum Key Distribution (QKD) Hoi-Kwong Lo Center for Quantum Information and Quantum Control Dept. of Electrical & Comp. Engineering (ECE);
222 views
Quantum Cryptography and Possible Attacks-slide
1.459 views
Security of continuous variable quantum key distribution against general attacks
162 views
A new secret handshakes scheme with dynamic matching based on zss
43 views
Searching Encrypted Cloud Data: Academia and Industry Done Right
474 views
Carnegie Mellon Paper
1.251 views
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs New York University Efficient Public-Key Cryptography in the Presence of Leakage
231 views
Proving Security Protocols Correct— Correctly Jonathan Herzog 21 March 2006 The author's affiliation with The MITRE Corporation is provided for identification
214 views
A Designer’s Guide to KEMs Alex Dent
[email protected]
alex
233 views
1 An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model (Multimedia University) Ji-Jian Chin Swee-Huay Heng Bok-Min
214 views
ON CONTINUAL LEAKAGE OF DISCRETE LOG REPRESENTATIONS Shweta Agrawal IIT, Delhi Joint work with Yevgeniy Dodis, Vinod Vaikuntanathan and Daniel Wichs Several
219 views
A Brief History of Provable Security and PKE
70 views
Next >