×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Key-Recovery Attacks on Universal Hash Function based MAC Algorithms - Helena Handschuh and Bart Preneel.pdf
Home
/
Discover
/
theswissbay.ch
/
pdf
/
Whitepaper
/
Crypto
/
Parent Folder
Key-Recovery Attacks on Universal Hash Function based MAC Algorithms - Helena Handschuh and Bart Preneel.pdf
PDF
6 years ago
223.15 kB
Copy Link
Imperfect forward secrecy_how Diffie-Hellman fails in practice - David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, ....pdf
PDF
6 years ago
1.32 MB
Copy Link
Leaking beeps_unencrypted pager messages in industrial environments - Stephen Hilt, Philippe Lin.pdf
PDF
6 years ago
1.39 MB
Copy Link
Imperfect Forward Secrecy_How Diffie-Hellman Fails in Practice - David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, ....pdf
PDF
6 years ago
1.32 MB
Copy Link
Learning to Read Encrypted VoIP Conversations - Fabian Monrose.pdf
PDF
6 years ago
2.22 MB
Copy Link
NISTIR 8105 DRAFT_Report on Post-Quantum Cryptography - Lily Chen, Stephen Jordan, Yi-Kai Liu, Dustin Moody, Rene Peralta, Ray Perlner, Daniel Smith-Tone.pdf
PDF
6 years ago
506.68 kB
Copy Link
How to improve rebound attacks - Marı́a Naya-Plasencia, FHNW, Windisch, Switzerland.pdf
PDF
6 years ago
649.74 kB
Copy Link
Not-quite-so-broken TLS 1.3 mechanised conformance checking - David Kaloper-Meršinjak, Hannes Mehnet.pdf
PDF
6 years ago
198.93 kB
Copy Link
How can quantum cryptography contribute to cyber-security - Nicolas Gisin, Hugo Zbinden.pdf
PDF
6 years ago
9.96 MB
Copy Link
On Collisions for MD5 - M.M.J. Stevens.pdf
PDF
6 years ago
651.04 kB
Copy Link
High-speed implementation of bcrypt password search using special-purpose hardware - Friedrich Wiemer, Ralf Zimmermann, Horst Görtz Institute for IT-Security (HGI), Ruhr-University Bochum, Germany.pdf
PDF
6 years ago
275.24 kB
Copy Link
On the Possibility of a Back Door in the NIST SP800-90 Dual Ec Prng - Dan Shumow, Niels Ferguson, Microsoft Corporation.pdf
PDF
6 years ago
56.68 kB
Copy Link
GCM, GHASH and weak keys - Markku-Juhani O. Saarinen.pdf
PDF
6 years ago
223.18 kB
Copy Link
On weak keys and forgery attacks against polynomial-based MAC schemes - Gordon Procter, Carlos Cid.pdf
PDF
6 years ago
433.46 kB
Copy Link
GCM security bounds reconsidered - Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata.pdf
PDF
6 years ago
279.59 kB
Copy Link
Password Interception in a SSL_TLS Channel - Brice Canvel, Alain Hiltgen, Serge Vaudenay, Martin Vuagnoux.pdf
PDF
6 years ago
162.19 kB
Copy Link
Forward secrecy in TLS_A systematic study - Nick Sullivan, Filippo Valsorda.pdf
PDF
6 years ago
5.54 MB
Copy Link
Password security_past, present, future (with strong bias towards password hashing) - Solar Designer, Simon Marechal.pdf
PDF
6 years ago
8.68 MB
Copy Link
Faster and timing-attack resistant AES-GCM - Emilia Käsper, Peter Schwabe.pdf
PDF
6 years ago
240.34 kB
Copy Link
Plaintext-Recovery Attacks Against Datagram TLS - Nadhem J. AlFardan, Kenneth G. Paterson.pdf
PDF
6 years ago
703.41 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.