×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Farfalle: parallel permutation-based cryptography - Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer.pdf
Home
/
Discover
/
theswissbay.ch
/
pdf
/
Whitepaper
/
Crypto
/
Parent Folder
Farfalle: parallel permutation-based cryptography - Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer.pdf
PDF
8 months ago
397.94 kB
Copy Link
Ed448-Goldilocks, a new elliptic curve - Mike Hamburg.pdf
PDF
8 months ago
248.54 kB
Copy Link
GIMLI: a cross-platform permutation - Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, etc.pdf
PDF
8 months ago
711.23 kB
Copy Link
Grafting Trees: a Fault Attack against the SPHINCS framework - Laurent Castelnovi, Ange, Martinelli, Thomas Prest.pdf
PDF
8 months ago
430.30 kB
Copy Link
Differential Power Analysis - Paul Kocher, Joshua Jaffe, Benjamin Jun (Cryptography Research Inc.).pdf
PDF
8 months ago
217.32 kB
Copy Link
HACL: A Verified Modern Cryptographic Library - Jean-Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche.pdf
PDF
8 months ago
627.33 kB
Copy Link
Deciphering Malware’s use of TLS (without Decryption) - Blake Anderson, Subharthi Paul, David McGrew (Cisco).pdf
PDF
8 months ago
512.69 kB
Copy Link
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption - Robert Granger, Philipp Jovanovic, Bart Mennink, Samuel Neves.pdf
PDF
8 months ago
834.36 kB
Copy Link
Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance and Collision Resistance - P. Rogway, T. Shrimpton.pdf
PDF
8 months ago
220.84 kB
Copy Link
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks - Dan Boneh, Henry Corrigan-Gibbs, Stuart Schechter.pdf
PDF
8 months ago
753.04 kB
Copy Link
Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds - Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir.pdf
PDF
8 months ago
292.24 kB
Copy Link
Note on side-channel attacks and their countermeasures - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche (Keccak team).pdf
PDF
8 months ago
107.74 kB
Copy Link
An Overview of Side Channel Attacks and Its Countermeasures using Elliptic Curve Cryptography - M. Prabu, R. Shanmugalakshmi.pdf
PDF
8 months ago
379.87 kB
Copy Link
Optimal PRFs from Blockcipher Designs - Bart Mennink, Samuel Neves.pdf
PDF
8 months ago
728.95 kB
Copy Link
AES-GCM-SIV: Specification and Analysis - Shay Gneron, Adam Langley, Yehuda Lindell.pdf
PDF
8 months ago
563.60 kB
Copy Link
Ouroboros: a simple, secure and efficient key exchange protocol based on coding theory - Jean-Christophe Deneuville.pdf
PDF
8 months ago
1.57 MB
Copy Link
A Simple Power Analysis Attack on the Serpent Key Schedule - Kevin J. Compton, Brian Timm, Joel VanLaven (University of Michigan).pdf
PDF
8 months ago
157.04 kB
Copy Link
Post-quantum RSA - Daniel J. Bernstein, Nadia Heninger, Pau Lon, Luke Valenta.pdf
PDF
8 months ago
355.15 kB
Copy Link
A Real-time Inversion Attack on the GMR-2 Cipher Used in the Satellite Phones - Jiao Hu, Ruilin Li, Chaojing Tang (National University of Defense Technology).pdf
PDF
8 months ago
739.28 kB
Copy Link
Practical fault attack against the Ed25519 and EdDSA signature schemes - Yolan Romailler, Sylvain Pelissier (Kudelski Security).pdf
PDF
8 months ago
787.41 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.