Short pages

Showing below up to 50 results in range #1 to #50.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎Файл:Stdx.png ‎[27 bytes]
  2. (hist) ‎Main Page ‎[62 bytes]
  3. (hist) ‎The PHOTON Family of Lightweight Hash Functions ‎[67 bytes]
  4. (hist) ‎Groth–Sahai proofs revisited ‎[71 bytes]
  5. (hist) ‎Leakage Resilient ElGamal Encryption ‎[87 bytes]
  6. (hist) ‎Secure Network Coding Over the Integers ‎[105 bytes]
  7. (hist) ‎Improved Single-Key Attacks on 8-Round AES-192 and AES-256 ‎[108 bytes]
  8. (hist) ‎Unlinkability of Sanitizable Signatures ‎[119 bytes]
  9. (hist) ‎Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems ‎[125 bytes]
  10. (hist) ‎Efficient String-Commitment from Weak Bit-Commitment ‎[148 bytes]
  11. (hist) ‎Analyzing Blockwise Lattice Algorithms using Dynamical Systems ‎[152 bytes]
  12. (hist) ‎Text Search Protocols with Simulation Based Security ‎[169 bytes]
  13. (hist) ‎Secure Computation on the Web: Computing without Simultaneous Interaction ‎[172 bytes]
  14. (hist) ‎Automatic Search of Attacks on round-reduced AES and Applications ‎[176 bytes]
  15. (hist) ‎More Constructions of Lossy and Correlation-Secure Trapdoor Functions ‎[196 bytes]
  16. (hist) ‎Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions ‎[229 bytes]
  17. (hist) ‎Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More ‎[237 bytes]
  18. (hist) ‎Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures ‎[276 bytes]
  19. (hist) ‎Apache Tapestry ‎[303 bytes]
  20. (hist) ‎1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds ‎[537 bytes]
  21. (hist) ‎Заглавная страница ‎[892 bytes]
  22. (hist) ‎Post s theorem ‎[1,126 bytes]
  23. (hist) ‎AFFS (Acer Fast File System) ‎[1,538 bytes]
  24. (hist) ‎SGRAM (Synchronous Graphics RAM) ‎[1,699 bytes]
  25. (hist) ‎Infobright ‎[1,712 bytes]
  26. (hist) ‎HyperDex ‎[1,872 bytes]
  27. (hist) ‎StreamType ‎[1,880 bytes]
  28. (hist) ‎Otway–Rees (protocol) ‎[1,939 bytes]
  29. (hist) ‎SIPP (Single In-line Pin Package) ‎[1,992 bytes]
  30. (hist) ‎FIPS PUB 180-3 ‎[2,086 bytes]
  31. (hist) ‎EXistdb ‎[2,108 bytes]
  32. (hist) ‎Burmester-Desmedt (protocol) ‎[2,121 bytes]
  33. (hist) ‎Apache HBase ‎[2,138 bytes]
  34. (hist) ‎FIPS PUB 180-2 ‎[2,149 bytes]
  35. (hist) ‎64 Studio ‎[2,220 bytes]
  36. (hist) ‎SDP (Software-defined Protection) ‎[2,229 bytes]
  37. (hist) ‎Dbm ‎[2,253 bytes]
  38. (hist) ‎Apache Tuscany ‎[2,343 bytes]
  39. (hist) ‎FIPS PUB 180-4 ‎[2,369 bytes]
  40. (hist) ‎GID (Group identifier) ‎[2,377 bytes]
  41. (hist) ‎Joy (programming language) ‎[2,404 bytes]
  42. (hist) ‎Nessus (Vulnerability Scanner) ‎[2,485 bytes]
  43. (hist) ‎L2TP (Layer 2 Tunneling Protocol) ‎[2,511 bytes]
  44. (hist) ‎GCstar ‎[2,621 bytes]
  45. (hist) ‎InfiniDB ‎[2,650 bytes]
  46. (hist) ‎UID (User identifier) ‎[2,677 bytes]
  47. (hist) ‎Multiprotocol BGP ‎[2,679 bytes]
  48. (hist) ‎DASS (Distributed Authentication Security Service) ‎[2,717 bytes]
  49. (hist) ‎Yahalom (protocol) ‎[2,735 bytes]
  50. (hist) ‎GNOME-DB ‎[2,758 bytes]

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)