×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Automated Crowdturfing Attacks and Defenses in Online Review Systems - Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng, Ben Y. Zhao.pdf
Home
/
Discover
/
theswissbay.ch
/
pdf
/
Whitepaper
/
Parent Folder
Automated Crowdturfing Attacks and Defenses in Online Review Systems - Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng, Ben Y. Zhao.pdf
PDF
7 months ago
2.11 MB
Copy Link
CHVote System Specifications v1.2 - Rolf Haenni, Reto E. Koenig, Philipp Locher, Eric Dubuis, Bern University of Applied Sciences.pdf
PDF
7 months ago
1.22 MB
Copy Link
A Plan for the next phase in Weather Modification Science and Technology Development - T.P. DeFelice.pdf
PDF
7 months ago
178.69 kB
Copy Link
HateMemeHandbook.pdf
PDF
7 months ago
90.69 MB
Copy Link
The Artilect War: Cosmists vs. Terrans - Hugo de Garis.pdf
PDF
7 months ago
34.32 kB
Copy Link
Visualizing Interstellar's Wormhole - Oliver James, Eugénie von Tunzelmann, Paul Franklin, Kip S. Thorne.pdf
PDF
7 months ago
7.78 MB
Copy Link
The Grey Matter of Securing Android Applications - Shiv Sahni (Lucideus Technologies).pdf
PDF
7 months ago
1.31 MB
Copy Link
A Formal Security Analysis of the Signal Messaging Protocol - Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila.pdf
PDF
7 months ago
555.26 kB
Copy Link
A Real-time Inversion Attack on the GMR-2 Cipher Used in the Satellite Phones - Jiao Hu, Ruilin Li, Chaojing Tang (National University of Defense Technology).pdf
PDF
7 months ago
739.28 kB
Copy Link
A Simple Power Analysis Attack on the Serpent Key Schedule - Kevin J. Compton, Brian Timm, Joel VanLaven (University of Michigan).pdf
PDF
7 months ago
157.04 kB
Copy Link
AES-GCM-SIV: Specification and Analysis - Shay Gneron, Adam Langley, Yehuda Lindell.pdf
PDF
7 months ago
563.60 kB
Copy Link
An Overview of Side Channel Attacks and Its Countermeasures using Elliptic Curve Cryptography - M. Prabu, R. Shanmugalakshmi.pdf
PDF
7 months ago
379.87 kB
Copy Link
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks - Dan Boneh, Henry Corrigan-Gibbs, Stuart Schechter.pdf
PDF
7 months ago
753.04 kB
Copy Link
Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance and Collision Resistance - P. Rogway, T. Shrimpton.pdf
PDF
7 months ago
220.84 kB
Copy Link
Deciphering Malware’s use of TLS (without Decryption) - Blake Anderson, Subharthi Paul, David McGrew (Cisco).pdf
PDF
7 months ago
512.69 kB
Copy Link
Differential Power Analysis - Paul Kocher, Joshua Jaffe, Benjamin Jun (Cryptography Research Inc.).pdf
PDF
7 months ago
217.32 kB
Copy Link
Ed448-Goldilocks, a new elliptic curve - Mike Hamburg.pdf
PDF
7 months ago
248.54 kB
Copy Link
Farfalle: parallel permutation-based cryptography - Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer.pdf
PDF
7 months ago
397.94 kB
Copy Link
GIMLI: a cross-platform permutation - Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, etc.pdf
PDF
7 months ago
711.23 kB
Copy Link
Grafting Trees: a Fault Attack against the SPHINCS framework - Laurent Castelnovi, Ange, Martinelli, Thomas Prest.pdf
PDF
7 months ago
430.30 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.