×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Crypto
Home
/
Discover
/
theswissbay.ch
/
pdf
/
Whitepaper
/
Crypto
/
Parent Folder
On weak keys and forgery attacks against polynomial-based MAC schemes - Gordon Procter, Carlos Cid.pdf
PDF
6 years ago
433.46 kB
Copy Link
Optimal PRFs from Blockcipher Designs - Bart Mennink, Samuel Neves.pdf
PDF
7 months ago
728.95 kB
Copy Link
Ouroboros: a simple, secure and efficient key exchange protocol based on coding theory - Jean-Christophe Deneuville.pdf
PDF
7 months ago
1.57 MB
Copy Link
Password Interception in a SSL_TLS Channel - Brice Canvel, Alain Hiltgen, Serge Vaudenay, Martin Vuagnoux.pdf
PDF
6 years ago
162.19 kB
Copy Link
Password security_past, present, future (with strong bias towards password hashing) - Solar Designer, Simon Marechal.pdf
PDF
6 years ago
8.68 MB
Copy Link
Plaintext-Recovery Attacks Against Datagram TLS - Nadhem J. AlFardan, Kenneth G. Paterson.pdf
PDF
6 years ago
703.41 kB
Copy Link
Post-quantum RSA - Daniel J. Bernstein, Nadia Heninger, Pau Lon, Luke Valenta.pdf
PDF
7 months ago
355.15 kB
Copy Link
Practical Cryptanalysis of PAES - Jérémy Jean, Ivica Nikolić, Yu Sasaki, Lei Wang.pdf
PDF
6 years ago
359.63 kB
Copy Link
Practical Forgeries and Distinguishers against PAES - Jérémy Jean, Ivica Nikolić, Yu Sasaki, Lei Wang.pdf
PDF
6 years ago
2.75 MB
Copy Link
Practical fault attack against the Ed25519 and EdDSA signature schemes - Yolan Romailler, Sylvain Pelissier (Kudelski Security).pdf
PDF
7 months ago
787.41 kB
Copy Link
Practical-titled attack on AES-128 using chosen-text relations - Vincent Rijmen.pdf
PDF
6 years ago
60.52 kB
Copy Link
Preimage and pseudo-Collision attacks on step-reduced SM3 hash function - Gaoli Wang, Yanzhao Shen, School of Computer Science and Technology, Donghua University, Shanghai, China.pdf
PDF
6 years ago
174.72 kB
Copy Link
RSA key extraction via low-bandwidth acoustic cryptanalysis - Daniel Genkin, Adi Shamir, Eran Tromer.pdf
PDF
6 years ago
7.71 MB
Copy Link
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols - Mihir Bellare, Phillip Rogaway.pdf
PDF
7 months ago
276.70 kB
Copy Link
Rebound attacks on the reduced Grøstl hash function - Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen.pdf
PDF
6 years ago
624.24 kB
Copy Link
Revisiting MAC forgeries, weak keys and provable security of Galois Counter Mode of operation - Bo Zhu, Yin Tan, Guang Gong.pdf
PDF
6 years ago
346.16 kB
Copy Link
Security dangers of the NIST curves - Daniel J. Bernstein, Tanja Lange.pdf
PDF
6 years ago
289.91 kB
Copy Link
Security flaws induced by CBC padding applications to SSL, IPSec, WTLS... - Serge Vaudenay.pdf
PDF
6 years ago
125.63 kB
Copy Link
Selecting cryptographics key sizes - Arjen K. Lenstra, Eric R. Verheul.pdf
PDF
6 years ago
145.44 kB
Copy Link
Side-Channel Attacks on BLISS Lattice-Based Signatures - Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi.pdf
PDF
7 months ago
2.62 MB
Copy Link
TEMPEST attacks against AES: Covertly stealing keys for €200 - Craig Ramsay, Jasper Lohuis.pdf
PDF
7 months ago
2.05 MB
Copy Link
The EAX mode of operation - M. Bellare, P. Rogaway, D. Wagner.pdf
PDF
6 years ago
724.22 kB
Copy Link
The Twofish team's final comments on AES selection - Bruche Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson, Tadayoshi Kohno, Mike Stay.pdf
PDF
6 years ago
146.22 kB
Copy Link
The first collision for full SHA-1 - Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, Yarik Markov.pdf
PDF
6 years ago
518.34 kB
Copy Link
The fragility of AES-GCM authentication algorithm - Shay Gueron, Vlad Krasnov.pdf
PDF
6 years ago
418.86 kB
Copy Link
The number field sieve for integers of low weight - Oliver Schirokauer.pdf
PDF
6 years ago
224.14 kB
Copy Link
The rebound attack and subspace distinguishers_application to Whirlpool - Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer.pdf
PDF
6 years ago
582.60 kB
Copy Link
The rebound attack_cryptanalysis of reduced Whirlpool and Grøstl - Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen.pdf
PDF
6 years ago
512.26 kB
Copy Link
The security and performance of the Galois Counter Mode (GCM) of operation - David A. McGrew, John Viega.pdf
PDF
6 years ago
267.93 kB
Copy Link
Timing Attacks on Implementations of Diffe-Hellman, RSA, DSS, and Other Systems - Paul C. Kocher (Cryptography Research Inc.).pdf
PDF
7 months ago
206.71 kB
Copy Link
To Decode Short Cryptograms - George W. Hart.pdf
PDF
6 years ago
790.61 kB
Copy Link
Towards Practical Attacks on Argon2i and Balloon Hashing - Joël Alwen, Jeremiah Blocki.pdf
PDF
7 months ago
Get Size
Copy Link
Unaligned rebound attack_application to Keccak - Alexandra Duc, Jian Guo, Thomas Peyrin, Lei Wei.pdf
PDF
6 years ago
504.98 kB
Copy Link
Updatable Encryption with Post-Compromise Security - Anja Lehmann, Björn Tackmann.pdf
PDF
7 months ago
Get Size
Copy Link
Using AES Round Symmetries to Distinguish PAES - Jérémy Jean, Ivica Nikolić.pdf
PDF
6 years ago
266.13 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.