318 results on '"Dahab, Ricardo"'
Search Results
2. Tutte’s 3-flow Conjecture for almost even graphs
3. Fast White-Box Implementations of Dedicated Ciphers on the ARMv8 Architecture
4. LWE-based Identification Schemes
5. A Minimal White-Box Dedicated Cipher Proposal Using Incompressible Lookup Tables: Space-Hard AES
6. Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems
7. Connecting the dots: Toward accountable machine-learning printer attribution methods
8. Introdução à criptografia para administradores de sistemas com TLS, OpenSSL e Apache mod_ssl
9. Fast White-Box Implementations of Dedicated Ciphers on the ARMv8 Architecture
10. Assurance Cases as a Didactic Tool for Information Security
11. Efficient and Secure Elliptic Curve Cryptography for 8-bit AVR Microcontrollers
12. Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes
13. A Panorama of Post-quantum Cryptography
14. Detecting Cryptography Misuses With Machine Learning: Graph Embeddings, Transfer Learning and Data Augmentation in Source Code Related Tasks
15. Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine
16. Evaluation of modular multiplication techniques for Supersingular Isogeny Schemes on ARMv8 cores
17. Evaluation of CRYSTALS-Kyber and Saber on the ARMv8 architecture
18. On Device Identity Establishment and Verification
19. NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks
20. Implementing Cryptographic Pairings over Barreto-Naehrig Curves
21. Two Notes on the Security of Certificateless Signatures
22. Optimistic Blinded-Key Signatures for ElGamal and Related Schemes
23. An Attack on a Protocol for Certified Delivery
24. High-Speed Software Multiplication in F2m
25. Improved Algorithms for Elliptic Curve Arithmetic in GF(2n)
26. Fast Multiplication on Elliptic Curves Over GF(2m) without precomputation
27. Canais laterais em criptografia simétrica e de curvas elípticas: ataques e contramedidas
28. TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
29. Introdução à Criptografia para Programadores: Evitando Maus Usos da Criptografia em Sistemas de Software
30. Efficient and Secure Elliptic Curve Cryptography for 8-bit AVR Microcontrollers
31. Assurance Cases as a Didactic Tool for Information Security
32. E-commerce of digital items and the problem of item validation: introducing the concept of reversible degradation
33. The Ring-LWE Problem in Lattice-Based Cryptography: The Case of Twisted Embeddings
34. A Custom Instruction Approach for Hardware and Software Implementations of Finite Field Arithmetic over \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathbb{F}_{{2^{{163}} }} $$\end{document} using Gaussian Normal Bases
35. Introdução à criptografia pós-quântica
36. Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine
37. SecLEACH—On the security of clustered sensor networks
38. Software multiplication using Gaussian normal bases
39. Using Graph Embeddings and Machine Learning to Detect Cryptography Misuse in Source Code
40. Encriptação homomórfica
41. On Device Identity Establishment and Verification
42. Introdução a Ataques por Canais Secundários
43. A machine learning approach to detect misuse of cryptographic APIs in source code
44. Introdução à Segurança Demonstrável
45. Understanding How to Use Static Analysis Tools for Detecting Cryptography Misuse in Software
46. Optimistic Blinded-Key Signatures for ElGamal and Related Schemes
47. Fast Multiplication on Elliptic Curves Over GF(2m) without precomputation
48. Improved Algorithms for Elliptic Curve Arithmetic in GF(2n)
49. Public-Key Cryptography – PKC 2018: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings, Part II
50. SOFIA: MQ-based signatures in the QROM
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.