×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Color image encryption using spiral encoding technique and symmetric key - Jayeeta Majumder, Partha Pratim Bankura.pdf
Home
/
Discover
/
theswissbay.ch
/
pdf
/
Whitepaper
/
Crypto
/
Parent Folder
Color image encryption using spiral encoding technique and symmetric key - Jayeeta Majumder, Partha Pratim Bankura.pdf
PDF
8 years ago
1.12 MB
Copy Link
Breaking and repairing GCM security proofs - Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu.pdf
PDF
8 years ago
333.13 kB
Copy Link
Console hacking 2010 - fail0verflow.pdf
PDF
8 years ago
8.73 MB
Copy Link
Bicliques for Preimages_Attacks on Skein-512 and the SHA-2 family - Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva.pdf
PDF
8 years ago
491.72 kB
Copy Link
Cycling attacks on GCM, GHASH and other polynomial MACs and hashes - Markku-Juhani O. Saarinen.pdf
PDF
8 years ago
318.10 kB
Copy Link
Attack on Sun's MIDP reference implementation of SSL - Kent Inge Simonsen, Vebjørn Moen, Kjell Jørgen Hole.pdf
PDF
8 years ago
434.81 kB
Copy Link
Efficient ephemeral elliptic curve cryptographic keys - Andrea Miele, Arjen K. Lenstra.pdf
PDF
8 years ago
389.10 kB
Copy Link
A riddle wrapped in an Enigma - Neal Koblitz, Alfred J. Menezes.pdf
PDF
8 years ago
432.93 kB
Copy Link
Efficient zero-knowledge proofs - Jens Groth.pdf
PDF
8 years ago
1.76 MB
Copy Link
A High Throughput_Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths — Toward Efficient CBC-Mode Implementation - Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki.pdf
PDF
8 years ago
481.05 kB
Copy Link
Faster and timing-attack resistant AES-GCM - Emilia Käsper, Peter Schwabe.pdf
PDF
8 years ago
240.34 kB
Copy Link
Forward secrecy in TLS_A systematic study - Nick Sullivan, Filippo Valsorda.pdf
PDF
8 years ago
5.54 MB
Copy Link
GCM security bounds reconsidered - Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata.pdf
PDF
8 years ago
279.59 kB
Copy Link
GCM, GHASH and weak keys - Markku-Juhani O. Saarinen.pdf
PDF
8 years ago
223.18 kB
Copy Link
How can quantum cryptography contribute to cyber-security - Nicolas Gisin, Hugo Zbinden.pdf
PDF
8 years ago
9.96 MB
Copy Link
Imperfect Forward Secrecy_How Diffie-Hellman Fails in Practice - David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, ....pdf
PDF
8 years ago
1.32 MB
Copy Link
Key-Recovery Attacks on Universal Hash Function based MAC Algorithms - Helena Handschuh and Bart Preneel.pdf
PDF
8 years ago
223.15 kB
Copy Link
Leaking beeps_unencrypted pager messages in industrial environments - Stephen Hilt, Philippe Lin.pdf
PDF
8 years ago
1.39 MB
Copy Link
Learning to Read Encrypted VoIP Conversations - Fabian Monrose.pdf
PDF
8 years ago
2.22 MB
Copy Link
NISTIR 8105 DRAFT_Report on Post-Quantum Cryptography - Lily Chen, Stephen Jordan, Yi-Kai Liu, Dustin Moody, Rene Peralta, Ray Perlner, Daniel Smith-Tone.pdf
PDF
8 years ago
506.68 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.