Lossy Encryption: Constructions from General Assumptions and ...
NFC Application Security Sandeep Tamrakar Aalto University, 2012-11-20.
Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications Vlastimil Klima 1) Independent cryptologist [email protected]@volny.cz,
Military DTN
Quantum one-time programs
Fuzzy Identity Based Signature