Solution Manual for Data Communications and Networking by Behrouz Forouzan_2
A Verifiable Secret Shuffle of Homomorphic Encryptions
IT1352 Cryptography and Network Security
lartc
Rv0xx_ CISCO Router Administration Guide
Quantum Money Scott Aaronson (MIT) Based partly on joint work with Ed Farhi, David Gosset, Avinatan Hassidim, Jon Kelner, Andy Lutomirski, and Peter Shor.
Universally Composable Symbolic Analysis of Cryptographic Protocols Ran Canetti and Jonathan Herzog 6 March 2006 The author's affiliation with The MITRE.
Privately Querying Location-based Services with SybilQuery Pravin Shankar, Vinod Ganapathy, and Liviu Iftode Department of Computer Science Rutgers University.
Efficiency vs. Assumptions in Secure Computation Yuval Ishai Technion & UCLA.
Its Not The Assumption, Its The Reduction GMfest13c Assumptions Panel Presentation Ran Canetti.
Rennes, 24/10/2014 Cristina Onete CIDRE/ INRIA Privacy in signatures. Hiding in rings, hiding in groups.
[PPT]