Search results

Jump to: navigation, search
  • ...l International Conference on the Theory and Applications of Cryptographic Techniques
    376 bytes (39 words) - 14:43, 9 April 2021
  • |Field=Cryptographic Techniques
    267 bytes (28 words) - 14:16, 9 October 2016
  • |Field=Cryptographic Techniques
    263 bytes (31 words) - 14:16, 9 October 2016
  • |Field=Cryptographic Techniques
    268 bytes (28 words) - 14:16, 9 October 2016
  • |Field=Cryptographic Techniques
    268 bytes (28 words) - 14:16, 9 October 2016
  • |Field=Cryptographic Techniques
    255 bytes (30 words) - 14:16, 9 October 2016
  • |Field=Cryptographic Techniques
    266 bytes (28 words) - 14:16, 9 October 2016
  • |Field=Cryptographic Techniques
    254 bytes (29 words) - 14:16, 9 October 2016
  • |Field=Cryptographic Techniques
    259 bytes (28 words) - 14:16, 9 October 2016
  • |Field=Cryptographic Techniques
    260 bytes (28 words) - 14:16, 9 October 2016
  • |Field=Cryptographic Techniques
    145 bytes (16 words) - 14:16, 9 October 2016
  • |Field=Cryptographic Techniques
    267 bytes (28 words) - 14:16, 9 October 2016
  • |Field=Cryptographic Techniques
    258 bytes (29 words) - 14:16, 9 October 2016
  • |Field=Cryptographic Techniques
    288 bytes (33 words) - 14:16, 9 October 2016
  • |Field=Cryptographic Techniques
    264 bytes (28 words) - 14:16, 9 October 2016
  • techniques; satisfiability modulo theories; combinations of logics and deductive and hash-based cryptographic primitives; algebraic cryptanalysis, algebraic
    5 KB (670 words) - 13:24, 28 July 2017
  • exchange and dissemination of new ideas, techniques and research in Cryptographic Protocols
    3 KB (347 words) - 19:48, 22 November 2017
  • -Cryptographic protocols against insider threats -Data breach modeling and mitigation techniques
    5 KB (611 words) - 11:47, 8 August 2017
  • particular, novel techniques and mechanisms aimed at the security and privacy Papers with a strong cryptographic background will not be considered as part of
    4 KB (547 words) - 09:58, 21 August 2017
  • ...l International Conference on the Theory and Applications of Cryptographic Techniques ...widely used standards, cryptographic protocols, quantum cryptography, and cryptographic currencies.
    1 KB (168 words) - 12:19, 24 May 2019

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)