Papers tagged cryptography
- And Then There Were None
- Communication Theory of Secrecy Systems
- New Directions in Cryptography
- NTRU Prime: Reducing Attack Surface at Low Cost
- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
- Shor’s Algorithms for Quantum Computation
- The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability
- The Moral Character of Cryptographic Work
- The New Threat: passive online attacks against PKCS#11 devices
- Tor: The Second-Generation Onion Router
- Twenty Years of Attacks on the RSA Cryptosystem
- Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms