Index of /pdf/Whitepaper/Crypto

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory   -  
[   ]AES-GCM-SIV 2024-12-17 18:17 0  
[   ]A Formal Security An..>2024-12-17 18:17 555K 
[   ]A High Throughput_Ga..>2024-12-17 18:24 481K 
[   ]A Real-time Inversio..>2024-12-17 18:17 739K 
[   ]A Simple Power Analy..>2024-12-17 18:17 157K 
[   ]An Overview of Side ..>2024-12-17 18:17 380K 
[   ]Analysis of SHA-512_..>2024-12-17 18:21 439K 
[   ]Are your passwords s..>2024-12-17 18:20 267K 
[   ]A riddle wrapped in ..>2024-12-17 18:23 433K 
[   ]Balloon Hashing 2024-12-17 18:17 0  
[   ]Bicliques for Preima..>2024-12-17 18:24 492K 
[   ]Chosen-prefix collis..>2024-12-17 18:21 270K 
[   ]Color image encrypti..>2024-12-17 18:23 1.1M 
[   ]Cryptanalysis of AES..>2024-12-17 18:20 2.0M 
[   ]Cryptographic Hash-F..>2024-12-17 18:17 0  
[   ]Deciphering Malwareâ..>2024-12-17 18:17 513K 
[   ]Differential Power A..>2024-12-17 18:17 217K 
[   ]ECDH key extraction ..>2024-12-17 18:21 3.4M 
[   ]Ed448-Goldilocks, a ..>2024-12-17 18:17 249K 
[   ]Efficient ephemeral ..>2024-12-17 18:24 389K 
[   ]Efficient zero-knowl..>2024-12-17 18:23 1.8M 
[   ]Energy-efficient bcr..>2024-12-17 18:21 6.8M 
[   ]Farfalle 2024-12-17 18:17 0  
[   ]Faster and timing-at..>2024-12-17 18:21 240K 
[   ]Forward secrecy in T..>2024-12-17 18:22 5.5M 
[   ]GIMLI 2024-12-17 18:17 0  
[   ]Grafting Trees 2024-12-17 18:16 0  
[   ]HACL 2024-12-17 18:17 0  
[   ]High-speed implement..>2024-12-17 18:20 275K 
[   ]How can quantum cryp..>2024-12-17 18:23 10M 
[   ]How to improve rebou..>2024-12-17 18:21 650K 
[   ]Imperfect Forward Se..>2024-12-17 18:24 1.3M 
[   ]Improved Masking for..>2024-12-17 18:17 834K 
[   ]Key-Recovery Attacks..>2024-12-17 18:24 223K 
[   ]Key Recovery Attacks..>2024-12-17 18:17 292K 
[   ]Leaking beeps_unencr..>2024-12-17 18:23 1.4M 
[   ]Learning to Read Enc..>2024-12-17 18:23 2.2M 
[   ]NISTIR 8105 DRAFT_Re..>2024-12-17 18:25 507K 
[DIR]NORX/ 2024-12-17 18:22 -  
[   ]Not-quite-so-broken ..>2024-12-17 18:23 199K 
[   ]Note on side-channel..>2024-12-17 18:17 108K 
[   ]On Collisions for MD..>2024-12-17 18:25 651K 
[   ]On the Possibility o..>2024-12-17 18:25 57K 
[   ]Optimal PRFs from Bl..>2024-12-17 18:17 729K 
[   ]Ouroboros 2024-12-17 18:17 0  
[   ]Password Interceptio..>2024-12-17 18:22 162K 
[   ]Password security_pa..>2024-12-17 18:22 8.7M 
[   ]Plaintext-Recovery A..>2024-12-17 18:25 703K 
[   ]Post-quantum RSA - D..>2024-12-17 18:17 355K 
[   ]Practical Cryptanaly..>2024-12-17 18:24 360K 
[   ]Practical Forgeries ..>2024-12-17 18:24 2.8M 
[   ]Practical fault atta..>2024-12-17 18:17 787K 
[   ]Preimage and pseudo-..>2024-12-17 18:21 175K 
[   ]RSA key extraction v..>2024-12-17 18:23 7.7M 
[   ]Random Oracles are P..>2024-12-17 18:17 0  
[   ]Rebound attacks on t..>2024-12-17 18:21 624K 
[   ]Security dangers of ..>2024-12-17 18:21 290K 
[   ]Security flaws induc..>2024-12-17 18:23 126K 
[   ]Selecting cryptograp..>2024-12-17 18:24 145K 
[   ]Side-Channel Attacks..>2024-12-17 18:17 2.6M 
[   ]TEMPEST attacks agai..>2024-12-17 18:17 0  
[   ]The Twofish team's f..>2024-12-17 18:20 146K 
[   ]The first collision ..>2024-12-17 18:21 518K 
[   ]The number field sie..>2024-12-17 18:21 224K 
[   ]The rebound attack_c..>2024-12-17 18:21 512K 
[   ]The rebound attack a..>2024-12-17 18:20 583K 
[   ]Timing Attacks on Im..>2024-12-17 18:17 207K 
[   ]To Decode Short Cryp..>2024-12-17 18:25 791K 
[   ]Towards Practical At..>2024-12-17 18:16 481K 
[   ]Unaligned rebound at..>2024-12-17 18:21 505K 
[   ]Updatable Encryption..>2024-12-17 18:17 619K 
[   ]Using AES Round Symm..>2024-12-17 18:24 266K 

Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12 Server at larren.zapto.org Port 80