×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Crypto
Home
/
Discover
/
theswissbay.ch
/
pdf
/
Whitepaper
/
Crypto
/
Parent Folder
NORX
2 files
A Formal Security Analysis of the Signal Messaging Protocol - Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila.pdf
PDF
7 months ago
555.26 kB
Copy Link
A High Throughput_Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths — Toward Efficient CBC-Mode Implementation - Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki.pdf
PDF
6 years ago
481.05 kB
Copy Link
A Real-time Inversion Attack on the GMR-2 Cipher Used in the Satellite Phones - Jiao Hu, Ruilin Li, Chaojing Tang (National University of Defense Technology).pdf
PDF
7 months ago
739.28 kB
Copy Link
A Simple Power Analysis Attack on the Serpent Key Schedule - Kevin J. Compton, Brian Timm, Joel VanLaven (University of Michigan).pdf
PDF
7 months ago
157.04 kB
Copy Link
A riddle wrapped in an Enigma - Neal Koblitz, Alfred J. Menezes.pdf
PDF
6 years ago
432.93 kB
Copy Link
AES-GCM-SIV: Specification and Analysis - Shay Gneron, Adam Langley, Yehuda Lindell.pdf
PDF
7 months ago
563.60 kB
Copy Link
An Overview of Side Channel Attacks and Its Countermeasures using Elliptic Curve Cryptography - M. Prabu, R. Shanmugalakshmi.pdf
PDF
7 months ago
379.87 kB
Copy Link
Analysis of SHA-512_224 and SHA-512_256 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Graz University of Technology, Austria.pdf
PDF
6 years ago
438.79 kB
Copy Link
Are your passwords safe_energy-efficient bcrypt cracking with low-cost parallel hardware - Katja Malvoni, Solar Designer, Josip Knezovic.pdf
PDF
6 years ago
267.49 kB
Copy Link
Attack on Sun's MIDP reference implementation of SSL - Kent Inge Simonsen, Vebjørn Moen, Kjell Jørgen Hole.pdf
PDF
6 years ago
434.81 kB
Copy Link
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks - Dan Boneh, Henry Corrigan-Gibbs, Stuart Schechter.pdf
PDF
7 months ago
753.04 kB
Copy Link
Bicliques for Preimages_Attacks on Skein-512 and the SHA-2 family - Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva.pdf
PDF
6 years ago
491.72 kB
Copy Link
Breaking and repairing GCM security proofs - Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu.pdf
PDF
6 years ago
333.13 kB
Copy Link
Chosen-prefix collisions for MD5 and colliding X.509 certificates for different identities - Marc Stevens, Arjen Lenstra, Benne de Weger.pdf
PDF
6 years ago
270.07 kB
Copy Link
Color image encryption using spiral encoding technique and symmetric key - Jayeeta Majumder, Partha Pratim Bankura.pdf
PDF
6 years ago
1.12 MB
Copy Link
Console hacking 2010 - fail0verflow.pdf
PDF
6 years ago
8.73 MB
Copy Link
Cryptanalysis of AES-based hash functions - Martin Schläfer.pdf
PDF
6 years ago
1.96 MB
Copy Link
Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance and Collision Resistance - P. Rogway, T. Shrimpton.pdf
PDF
7 months ago
220.84 kB
Copy Link
Cycling attacks on GCM, GHASH and other polynomial MACs and hashes - Markku-Juhani O. Saarinen.pdf
PDF
6 years ago
318.10 kB
Copy Link
Deciphering Malware’s use of TLS (without Decryption) - Blake Anderson, Subharthi Paul, David McGrew (Cisco).pdf
PDF
7 months ago
512.69 kB
Copy Link
Differential Power Analysis - Paul Kocher, Joshua Jaffe, Benjamin Jun (Cryptography Research Inc.).pdf
PDF
7 months ago
217.32 kB
Copy Link
ECDH key extraction via low-bandwidth electromagnetic attacks on PCs - Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Tel Aviv University.pdf
PDF
6 years ago
3.42 MB
Copy Link
Ed448-Goldilocks, a new elliptic curve - Mike Hamburg.pdf
PDF
7 months ago
248.54 kB
Copy Link
Efficient ephemeral elliptic curve cryptographic keys - Andrea Miele, Arjen K. Lenstra.pdf
PDF
6 years ago
389.10 kB
Copy Link
Efficient zero-knowledge proofs - Jens Groth.pdf
PDF
6 years ago
1.76 MB
Copy Link
Energy-efficient bcrypt cracking - Katja Malvoni, Solar Designer.pdf
PDF
6 years ago
6.85 MB
Copy Link
Farfalle: parallel permutation-based cryptography - Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer.pdf
PDF
7 months ago
397.94 kB
Copy Link
Faster and timing-attack resistant AES-GCM - Emilia Käsper, Peter Schwabe.pdf
PDF
6 years ago
240.34 kB
Copy Link
Forward secrecy in TLS_A systematic study - Nick Sullivan, Filippo Valsorda.pdf
PDF
6 years ago
5.54 MB
Copy Link
GCM security bounds reconsidered - Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata.pdf
PDF
6 years ago
279.59 kB
Copy Link
GCM, GHASH and weak keys - Markku-Juhani O. Saarinen.pdf
PDF
6 years ago
223.18 kB
Copy Link
GIMLI: a cross-platform permutation - Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, etc.pdf
PDF
7 months ago
711.23 kB
Copy Link
Grafting Trees: a Fault Attack against the SPHINCS framework - Laurent Castelnovi, Ange, Martinelli, Thomas Prest.pdf
PDF
7 months ago
430.30 kB
Copy Link
HACL: A Verified Modern Cryptographic Library - Jean-Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche.pdf
PDF
7 months ago
627.33 kB
Copy Link
High-speed implementation of bcrypt password search using special-purpose hardware - Friedrich Wiemer, Ralf Zimmermann, Horst Görtz Institute for IT-Security (HGI), Ruhr-University Bochum, Germany.pdf
PDF
6 years ago
275.24 kB
Copy Link
How can quantum cryptography contribute to cyber-security - Nicolas Gisin, Hugo Zbinden.pdf
PDF
6 years ago
9.96 MB
Copy Link
How to improve rebound attacks - Marı́a Naya-Plasencia, FHNW, Windisch, Switzerland.pdf
PDF
6 years ago
649.74 kB
Copy Link
Imperfect Forward Secrecy_How Diffie-Hellman Fails in Practice - David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, ....pdf
PDF
6 years ago
1.32 MB
Copy Link
Imperfect forward secrecy_how Diffie-Hellman fails in practice - David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, ....pdf
PDF
6 years ago
1.32 MB
Copy Link
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption - Robert Granger, Philipp Jovanovic, Bart Mennink, Samuel Neves.pdf
PDF
7 months ago
834.36 kB
Copy Link
Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds - Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitry Khovratovich, Adi Shamir.pdf
PDF
7 months ago
292.24 kB
Copy Link
Key-Recovery Attacks on Universal Hash Function based MAC Algorithms - Helena Handschuh and Bart Preneel.pdf
PDF
6 years ago
223.15 kB
Copy Link
Leaking beeps_unencrypted pager messages in industrial environments - Stephen Hilt, Philippe Lin.pdf
PDF
6 years ago
1.39 MB
Copy Link
Learning to Read Encrypted VoIP Conversations - Fabian Monrose.pdf
PDF
6 years ago
2.22 MB
Copy Link
NISTIR 8105 DRAFT_Report on Post-Quantum Cryptography - Lily Chen, Stephen Jordan, Yi-Kai Liu, Dustin Moody, Rene Peralta, Ray Perlner, Daniel Smith-Tone.pdf
PDF
6 years ago
506.68 kB
Copy Link
Not-quite-so-broken TLS 1.3 mechanised conformance checking - David Kaloper-Meršinjak, Hannes Mehnet.pdf
PDF
6 years ago
198.93 kB
Copy Link
Note on side-channel attacks and their countermeasures - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche (Keccak team).pdf
PDF
7 months ago
107.74 kB
Copy Link
On Collisions for MD5 - M.M.J. Stevens.pdf
PDF
6 years ago
651.04 kB
Copy Link
On the Possibility of a Back Door in the NIST SP800-90 Dual Ec Prng - Dan Shumow, Niels Ferguson, Microsoft Corporation.pdf
PDF
6 years ago
56.68 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.