×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [security proofs]
1 Decoy State Quantum Key Distribution (QKD) Hoi-Kwong Lo Center for Quantum Information and Quantum Control Dept. of Electrical & Comp. Engineering (ECE);
220 views
Quantum Cryptography and Possible Attacks-slide
1.458 views
Security of continuous variable quantum key distribution against general attacks
161 views
A new secret handshakes scheme with dynamic matching based on zss
42 views
Searching Encrypted Cloud Data: Academia and Industry Done Right
474 views
Carnegie Mellon Paper
1.250 views
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs New York University Efficient Public-Key Cryptography in the Presence of Leakage
230 views
Proving Security Protocols Correct— Correctly Jonathan Herzog 21 March 2006 The author's affiliation with The MITRE Corporation is provided for identification
214 views
A Designer’s Guide to KEMs Alex Dent
[email protected]
alex
233 views
1 An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model (Multimedia University) Ji-Jian Chin Swee-Huay Heng Bok-Min
214 views
ON CONTINUAL LEAKAGE OF DISCRETE LOG REPRESENTATIONS Shweta Agrawal IIT, Delhi Joint work with Yevgeniy Dodis, Vinod Vaikuntanathan and Daniel Wichs Several
219 views
A Brief History of Provable Security and PKE
69 views
Next >