×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Note on side-channel attacks and their countermeasures - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche (Keccak team).pdf
Home
/
Discover
/
theswissbay.ch
/
pdf
/
Whitepaper
/
Crypto
/
Parent Folder
Note on side-channel attacks and their countermeasures - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche (Keccak team).pdf
PDF
8 months ago
107.74 kB
Copy Link
Optimal PRFs from Blockcipher Designs - Bart Mennink, Samuel Neves.pdf
PDF
8 months ago
728.95 kB
Copy Link
Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds - Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir.pdf
PDF
8 months ago
292.24 kB
Copy Link
Ouroboros: a simple, secure and efficient key exchange protocol based on coding theory - Jean-Christophe Deneuville.pdf
PDF
8 months ago
1.57 MB
Copy Link
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption - Robert Granger, Philipp Jovanovic, Bart Mennink, Samuel Neves.pdf
PDF
8 months ago
834.36 kB
Copy Link
HACL: A Verified Modern Cryptographic Library - Jean-Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche.pdf
PDF
8 months ago
627.33 kB
Copy Link
Post-quantum RSA - Daniel J. Bernstein, Nadia Heninger, Pau Lon, Luke Valenta.pdf
PDF
8 months ago
355.15 kB
Copy Link
Practical fault attack against the Ed25519 and EdDSA signature schemes - Yolan Romailler, Sylvain Pelissier (Kudelski Security).pdf
PDF
8 months ago
787.41 kB
Copy Link
Grafting Trees: a Fault Attack against the SPHINCS framework - Laurent Castelnovi, Ange, Martinelli, Thomas Prest.pdf
PDF
8 months ago
430.30 kB
Copy Link
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols - Mihir Bellare, Phillip Rogaway.pdf
PDF
8 months ago
276.70 kB
Copy Link
GIMLI: a cross-platform permutation - Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, etc.pdf
PDF
8 months ago
711.23 kB
Copy Link
Side-Channel Attacks on BLISS Lattice-Based Signatures - Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi.pdf
PDF
8 months ago
2.62 MB
Copy Link
Farfalle: parallel permutation-based cryptography - Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer.pdf
PDF
8 months ago
397.94 kB
Copy Link
TEMPEST attacks against AES: Covertly stealing keys for €200 - Craig Ramsay, Jasper Lohuis.pdf
PDF
8 months ago
2.05 MB
Copy Link
Ed448-Goldilocks, a new elliptic curve - Mike Hamburg.pdf
PDF
8 months ago
248.54 kB
Copy Link
Differential Power Analysis - Paul Kocher, Joshua Jaffe, Benjamin Jun (Cryptography Research Inc.).pdf
PDF
8 months ago
217.32 kB
Copy Link
Timing Attacks on Implementations of Diffe-Hellman, RSA, DSS, and Other Systems - Paul C. Kocher (Cryptography Research Inc.).pdf
PDF
8 months ago
206.71 kB
Copy Link
Towards Practical Attacks on Argon2i and Balloon Hashing - Joël Alwen, Jeremiah Blocki.pdf
PDF
8 months ago
Get Size
Copy Link
Deciphering Malware’s use of TLS (without Decryption) - Blake Anderson, Subharthi Paul, David McGrew (Cisco).pdf
PDF
8 months ago
512.69 kB
Copy Link
Updatable Encryption with Post-Compromise Security - Anja Lehmann, Björn Tackmann.pdf
PDF
8 months ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.