1
Katz, Jonathan
2016
Table of Contents:
“...Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis -- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number theory -- Symmetric primitives -- Asymmetric...”2016
Full text
2
Katz, Jonathan
2016
Table of Contents:
“...Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis -- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number theory -- Symmetric primitives -- Asymmetric...”2016
Full text
3
Katz, Jonathan
2016
Table of Contents:
“...Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis -- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number theory -- Symmetric primitives -- Asymmetric...”2016
Full text
4
Table of Contents:
“...(Pseudo)randomness -- LPN/LWE -- Cryptanalysis -- Masking -- Fully homomorphic encryption -- Number theory -- Hash functions -- Multilinear maps -- Message authentification codes -- Attacks on SSL/TLS -- Real-world protocols -- Robust designs -- Lattice...”
Full text
Full text
5
6
7
8
Hirota, Osamu
2002
Table of Contents:
“... Computers -- Quantum Probabilistic Subroutines and Problems in Number Theory -- Theory of the Quantum Speed Up -- Quantum Gates Using Motional States in an Optical Lattice -- Quantum Error-Correcting Code for Burst Error -- Non-Dissipative Decoherence in Ion-Trap...”2002
Full text