865 results on '"Maurer, Ueli"'
Search Results
302. Zero-knowledge proofs of knowledge for group homomorphisms
303. Bundesrat Ueli Maurer : Grösse und Kapazität der neuen Armee
304. Federal Councillor Ueli Maurer : Maurer: 'Now I have the dream job in politics'
305. Bundesrat Ueli Maurer : Maurer: 'Jetzt habe ich den politischen Traumjob'
306. Armee auf soliden Boden stellen
307. El consejero federal Ueli Maurer : Maurer: 'Mi actual trabajo político es de ensueño'
308. Unangemeldet : Interview
309. Kryptografie Paradoxa der Mathematik
310. Flucht in die Reformen
311. Le conseiller fédéral Ueli Maurer : Ueli Maurer: 'J'ai maintenant le job politique de rêve'
312. Die Erneuerung unserer Luftwaffe
313. Am leeren Strand von Troja
314. Bundesrat Ueli Maurer : Führung auf strategischer Ebene
315. Die beste Armee der Welt : Interview
316. Der Freiheitsgedanke als Wegleitung
317. Die Armee konsolidieren
318. 'Rollen der Akteure bei Krisenbewältigung klären' : Interview
319. Boden und Bürgersinn : Grundeigentum im Grundsätzlichen
320. 'Beste Armee der Welt' : Interview
321. 07381 Abstracts Collection ��� Cryptography
322. 07381 Executive Summary - Cryptography
323. From Indifferentiability to Constructive Cryptography (and Back).
324. Memory Erasability Amplification.
325. Network-Hiding Communication and Applications to Multi-party Protocols.
326. Abstract Storage Devices
327. Locking of accessible information and implications for the security of quantum cryptography
328. Dafür und dagegen : Ende der Wehrpflicht?
329. New Public-Key Schemes Based on Elliptic Curves over the Ring Zn
330. A Simplified and Generalized Treatment of Luby-Rackoff Pseudorandom Permutation Generators
331. Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations
332. Factoring with an Oracle
333. A Remark on a Non-interactive Public-Key Distribution System
334. New Approaches to the Design of Self-Synchronizing Stream Ciphers
335. Indistinguishability Amplification
336. Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms
337. Domain Extension of Public Random Functions: Beyond the Birthday Barrier
338. Fast Generation of Secure RSA-Moduli with Almost Maximal Diversity
339. Directed Acyclic Graphs, One-way Functions and Digital Signatures
340. MPC vs. SFE: Perfect Security in a Unified Corruption Model
341. A Universal Statistical Test for Random Bit Generators
342. Perfect Local Randomness in Pseudo-random Sequences
343. Protocols for Secret Key Agreement by Public Discussion Based on Common Information
344. Non-interactive Public-Key Cryptography
345. Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers
346. Optimality of non-adaptive strategies: The case of parallel games
347. Dafür und dagegen : Neu-Start für die Zauberformel?
348. Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks
349. Anonymous Authentication with Shared Secrets.
350. Query-Complexity Amplification for Random Oracles.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.