Cryptography and Security
Authors and titles for August 2012
- [1] arXiv:1208.0070 [pdf, other]
- [2] arXiv:1208.0107 [pdf, other]
- [3] arXiv:1208.0108 [pdf, other]
- [4] arXiv:1208.0403 [pdf, other]
- [5] arXiv:1208.0564 [pdf, other]
- [6] arXiv:1208.0688 [pdf, other]
- [7] arXiv:1208.0803 [pdf, other]
- [8] arXiv:1208.0950 [pdf, other]
- [9] arXiv:1208.0999 [pdf, other]
- [10] arXiv:1208.1176 [pdf, other]
- [11] arXiv:1208.1217 [pdf, other]
- [12] arXiv:1208.1336 [pdf, other]
- [13] arXiv:1208.1346 [pdf, other]
- [14] arXiv:1208.1712 [pdf, other]
- [15] arXiv:1208.1900 [pdf, other]
- [16] arXiv:1208.1918 [pdf, other]
- [17] arXiv:1208.1959 [pdf, other]
- [18] arXiv:1208.1984 [pdf, other]
- [19] arXiv:1208.2169 [pdf, other]
- [20] arXiv:1208.2305 [pdf, other]
- [21] arXiv:1208.2333 [pdf, other]
- [22] arXiv:1208.2334 [pdf, other]
- [23] arXiv:1208.2357 [pdf, other]
- [24] arXiv:1208.2861 [pdf, other]
- [25] arXiv:1208.2877 [pdf, other]