Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Lattice attacks and constructions
Obfuscation and functional encryption
Discrete logarithm
Multiparty computation
Universal composability
Zero knowledge
Side-channel attacks and countermeasures
Functional encryption
Elliptic curves
Symmetric cryptanalysis
Provable security for symmetric cryptography
security models:- Blockchain
Memory hard functions
Symmetric-key constructions
Obfuscation
Quantum cryptography
Public-key encryption and key-exchange.

Browse Subjects

Show more subjects...

Statistics

from
to
Export