Cryptography and Security
Authors and titles for February 2014
- [1] arXiv:1402.0239 [pdf, ps, other]
- [2] arXiv:1402.0601 [pdf, ps, other]
- [3] arXiv:1402.0856 [pdf, ps, other]
- [4] arXiv:1402.0886 [pdf, ps, other]
- [5] arXiv:1402.0972 [pdf, ps, other]
- [6] arXiv:1402.1216 [pdf, ps, other]
- [7] arXiv:1402.1242 [pdf, ps, other]
- [8] arXiv:1402.1314 [pdf, ps, other]
- [9] arXiv:1402.1718 [pdf, ps, other]
- [10] arXiv:1402.1732 [pdf, ps, other]
- [11] arXiv:1402.1842 [pdf, ps, other]
- [12] arXiv:1402.1940 [pdf, ps, other]
- [13] arXiv:1402.2009 [pdf, ps, other]
- [14] arXiv:1402.2206 [pdf, ps, other]
- [15] arXiv:1402.2224 [pdf, ps, other]
- [16] arXiv:1402.2269 [pdf, ps, other]
- [17] arXiv:1402.2699 [pdf, ps, other]
- [18] arXiv:1402.2709 [pdf, ps, other]
- [19] arXiv:1402.2745 [pdf, ps, other]
- [20] arXiv:1402.3125 [pdf, ps, other]
- [21] arXiv:1402.3198 [pdf, ps, other]
- [22] arXiv:1402.3264 [pdf, ps, other]
- [23] arXiv:1402.3384 [pdf, ps, other]
- [24] arXiv:1402.3426 [pdf, ps, other]
- [25] arXiv:1402.3661 [pdf, ps, other]