Index of /pdf/Whitepaper/Crypto
Name
Last modified
Size
Description
Parent Directory
-
AES-GCM-SIV
2024-12-17 18:17
0
A Formal Security An..>
2024-12-17 18:17
555K
A High Throughput_Ga..>
2024-12-17 18:24
481K
A Real-time Inversio..>
2024-12-17 18:17
739K
A Simple Power Analy..>
2024-12-17 18:17
157K
An Overview of Side ..>
2024-12-17 18:17
380K
Analysis of SHA-512_..>
2024-12-17 18:21
439K
Are your passwords s..>
2024-12-17 18:20
267K
A riddle wrapped in ..>
2024-12-17 18:23
433K
Balloon Hashing
2024-12-17 18:17
0
Bicliques for Preima..>
2024-12-17 18:24
492K
Chosen-prefix collis..>
2024-12-17 18:21
270K
Color image encrypti..>
2024-12-17 18:23
1.1M
Cryptanalysis of AES..>
2024-12-17 18:20
2.0M
Cryptographic Hash-F..>
2024-12-17 18:17
0
Deciphering Malwareâ..>
2024-12-17 18:17
513K
Differential Power A..>
2024-12-17 18:17
217K
ECDH key extraction ..>
2024-12-17 18:21
3.4M
Ed448-Goldilocks, a ..>
2024-12-17 18:17
249K
Efficient ephemeral ..>
2024-12-17 18:24
389K
Efficient zero-knowl..>
2024-12-17 18:23
1.8M
Energy-efficient bcr..>
2024-12-17 18:21
6.8M
Farfalle
2024-12-17 18:17
0
Faster and timing-at..>
2024-12-17 18:21
240K
Forward secrecy in T..>
2024-12-17 18:22
5.5M
GIMLI
2024-12-17 18:17
0
Grafting Trees
2024-12-17 18:16
0
HACL
2024-12-17 18:17
0
High-speed implement..>
2024-12-17 18:20
275K
How can quantum cryp..>
2024-12-17 18:23
10M
How to improve rebou..>
2024-12-17 18:21
650K
Imperfect Forward Se..>
2024-12-17 18:24
1.3M
Improved Masking for..>
2024-12-17 18:17
834K
Key-Recovery Attacks..>
2024-12-17 18:24
223K
Key Recovery Attacks..>
2024-12-17 18:17
292K
Leaking beeps_unencr..>
2024-12-17 18:23
1.4M
Learning to Read Enc..>
2024-12-17 18:23
2.2M
NISTIR 8105 DRAFT_Re..>
2024-12-17 18:25
507K
NORX/
2024-12-17 18:22
-
Not-quite-so-broken ..>
2024-12-17 18:23
199K
Note on side-channel..>
2024-12-17 18:17
108K
On Collisions for MD..>
2024-12-17 18:25
651K
On the Possibility o..>
2024-12-17 18:25
57K
Optimal PRFs from Bl..>
2024-12-17 18:17
729K
Ouroboros
2024-12-17 18:17
0
Password Interceptio..>
2024-12-17 18:22
162K
Password security_pa..>
2024-12-17 18:22
8.7M
Plaintext-Recovery A..>
2024-12-17 18:25
703K
Post-quantum RSA - D..>
2024-12-17 18:17
355K
Practical Cryptanaly..>
2024-12-17 18:24
360K
Practical Forgeries ..>
2024-12-17 18:24
2.8M
Practical fault atta..>
2024-12-17 18:17
787K
Preimage and pseudo-..>
2024-12-17 18:21
175K
RSA key extraction v..>
2024-12-17 18:23
7.7M
Random Oracles are P..>
2024-12-17 18:17
0
Rebound attacks on t..>
2024-12-17 18:21
624K
Security dangers of ..>
2024-12-17 18:21
290K
Security flaws induc..>
2024-12-17 18:23
126K
Selecting cryptograp..>
2024-12-17 18:24
145K
Side-Channel Attacks..>
2024-12-17 18:17
2.6M
TEMPEST attacks agai..>
2024-12-17 18:17
0
The Twofish team's f..>
2024-12-17 18:20
146K
The first collision ..>
2024-12-17 18:21
518K
The number field sie..>
2024-12-17 18:21
224K
The rebound attack_c..>
2024-12-17 18:21
512K
The rebound attack a..>
2024-12-17 18:20
583K
Timing Attacks on Im..>
2024-12-17 18:17
207K
To Decode Short Cryp..>
2024-12-17 18:25
791K
Towards Practical At..>
2024-12-17 18:16
481K
Unaligned rebound at..>
2024-12-17 18:21
505K
Updatable Encryption..>
2024-12-17 18:17
619K
Using AES Round Symm..>
2024-12-17 18:24
266K
Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12 Server at larren.zapto.org Port 80