%PDF-1.3
%
1 0 obj
<>
endobj
411 0 obj
<>stream
application/pdf
null
Information Security group, InfSec
Department of Computer Science
ETH Zurich, Switzerland
2014-12-09T16:49:38.146+01:00
BAP: Broadcast Authentication Using Cryptographic Puzzles
957d58dc28e14a2e2a164127aa0c38f6c8c3c91c
2014-12-09T16:49:21.313+01:00
GNU Ghostscript 7.05
GNU Ghostscript 7.05
endstream
endobj
3 0 obj
<>
endobj
5 0 obj
<>/Rotate 0/Type/Page>>
endobj
38 0 obj
<>/Rotate 0/Type/Page>>
endobj
49 0 obj
<>/Rotate 0/Type/Page>>
endobj
150 0 obj
<>/Rotate 0/Type/Page>>
endobj
258 0 obj
<>/Rotate 0/Type/Page>>
endobj
263 0 obj
<>/Rotate 0/Type/Page>>
endobj
311 0 obj
<>/Rotate 0/Type/Page>>
endobj
328 0 obj
<>/Rotate 0/Type/Page>>
endobj
334 0 obj
<>/Rotate 0/Type/Page>>
endobj
374 0 obj
<>/Rotate 0/Type/Page>>
endobj
386 0 obj
<>/Rotate 0/Type/Page>>
endobj
390 0 obj
<>/Rotate 0/Type/Page>>
endobj
395 0 obj
<>/Rotate 0/Type/Page>>
endobj
396 0 obj
<>stream
xZMs8cN{ߋnI,'8g2v'{%FX"J (@ t~ϳ<#q/wO>?<#Økz2rBfW"#t4]<#՟0ΌLsˌٜɳ?JiIa9;O;$2cbn6hF8ib LFU[d2iqʶ6+_WnEr?u1rǾTDQ{x?m~a"R9۪._~Pa$roa"K7Us,#jS^LJ4mͲ:+JJ>5pXG+N1QiP~b]_Q~ioт
G#y]4Y3\2·t
3C[4˲\1|νeOkҹ7Dbl+@jg/MIi),bB6HYf[
a-,G&|r*o(4xq4(f``C0osp( [*Cǭ)0^EUj(qm]no߾mn3=e{w7붸T˸F.u,:NLr0/u].-\3m&0}_,]
ĮQ'`/Zs-3fhU_/uSc/ Asчv.b2Wx弪s<Ńw]_SB
93
N1#)п%u{z!u6ܯ6m?QAp1!tuI~\},<. :UjEO;!Q@( 1[0' Cg$l!ǴIL7sF ̧8]Y3"~*&x
,F$:si6zW0E~C@633ep7+sCh7T eLG+(.h4nBp25=nƽ2C6PiѪw#4CJIIFxs r A]MZ#A3XF@DGő˃@:?Q2JXsPHrcCK(גHhJcy
M^)n7@0XP:G2}P7x^CX/@pf5BJ3)hdhZ8{`%z% L1~`Vdy<&kǢR!rp heQ-q1H"HaF|.WqM