• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 9
  • 5
  • 1
  • 1
  • Tagged with
  • 16
  • 16
  • 16
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Rigorously analyzed algorithms for the discrete logarithm problem in quadratic number fields

Vollmer, Ulrich. January 1900 (has links) (PDF)
Darmstadt, Techn. Univ., Diss., 2003. / Computerdatei im Fernzugriff.
2

Design und Analyse kryptografischer Bausteine auf nicht-abelschen Gruppen

Tobias, Christian. January 2004 (has links) (PDF)
Giessen, Universiẗat, Diss., 2004.
3

Rigorously analyzed algorithms for the discrete logarithm problem in quadratic number fields

Vollmer, Ulrich. January 1900 (has links) (PDF)
Darmstadt, Techn. University, Diss., 2003.
4

Public key cryptography theory and practice /

Möller, Bodo. January 2003 (has links) (PDF)
Darmstadt, Techn. University, Diss., 2003.
5

New public-key cryptosystems with fast decryption

Takagi, Tsuyoshi. January 2001 (has links) (PDF)
Darmstadt, Techn. University, Diss., 2001.
6

Polly two - a public key cryptosystem based on Polly cracker

Le, Van-Ly. January 2003 (has links) (PDF)
Bochum, University, Diss., 2003.
7

Contributions to provable security and efficient cryptography

Schmidt-Samoa, Katja. Unknown Date (has links)
Techn. University, Diss., 2006--Darmstadt.
8

Auf Polynomgleichungen basierende Public-Key-Kryptosysteme

May, Alexander Unknown Date (has links)
Univ., Diplomarbeit, 1999--Frankfurt (Main)
9

Untersuchung aktueller Sicherheitsmodelle bezüglich ihrer Eignung für den elektronischen Handel

Musleh, Jens. January 2001 (has links)
Stuttgart, Univ., Diplomarb., 2001.
10

Public Key Kryptografie mit GNU Privacy Guard

Kutzner, Kendy 18 October 2002 (has links) (PDF)
Vortrag ueber das Warum und Wie der Kryptografie mit oeffentlichen Schluesseln am Beispiel von GNU Privacy Guard

Page generated in 0.1057 seconds