Index of /pdf/Whitepaper/Crypto
Name
Last modified
Size
Description
Parent Directory
-
NORX/
2024-12-17 18:22
-
AES-GCM-SIV
2024-12-17 18:17
0
Balloon Hashing
2024-12-17 18:17
0
Cryptographic Hash-F..>
2024-12-17 18:17
0
Farfalle
2024-12-17 18:17
0
GIMLI
2024-12-17 18:17
0
Grafting Trees
2024-12-17 18:16
0
HACL
2024-12-17 18:17
0
Ouroboros
2024-12-17 18:17
0
Random Oracles are P..>
2024-12-17 18:17
0
TEMPEST attacks agai..>
2024-12-17 18:17
0
On the Possibility o..>
2024-12-17 18:25
57K
Note on side-channel..>
2024-12-17 18:17
108K
Security flaws induc..>
2024-12-17 18:23
126K
Selecting cryptograp..>
2024-12-17 18:24
145K
The Twofish team's f..>
2024-12-17 18:20
146K
A Simple Power Analy..>
2024-12-17 18:17
157K
Password Interceptio..>
2024-12-17 18:22
162K
Preimage and pseudo-..>
2024-12-17 18:21
175K
Not-quite-so-broken ..>
2024-12-17 18:23
199K
Timing Attacks on Im..>
2024-12-17 18:17
207K
Differential Power A..>
2024-12-17 18:17
217K
Key-Recovery Attacks..>
2024-12-17 18:24
223K
The number field sie..>
2024-12-17 18:21
224K
Faster and timing-at..>
2024-12-17 18:21
240K
Ed448-Goldilocks, a ..>
2024-12-17 18:17
249K
Using AES Round Symm..>
2024-12-17 18:24
266K
Are your passwords s..>
2024-12-17 18:20
267K
Chosen-prefix collis..>
2024-12-17 18:21
270K
High-speed implement..>
2024-12-17 18:20
275K
Security dangers of ..>
2024-12-17 18:21
290K
Key Recovery Attacks..>
2024-12-17 18:17
292K
Post-quantum RSA - D..>
2024-12-17 18:17
355K
Practical Cryptanaly..>
2024-12-17 18:24
360K
An Overview of Side ..>
2024-12-17 18:17
380K
Efficient ephemeral ..>
2024-12-17 18:24
389K
A riddle wrapped in ..>
2024-12-17 18:23
433K
Analysis of SHA-512_..>
2024-12-17 18:21
439K
Towards Practical At..>
2024-12-17 18:16
481K
A High Throughput_Ga..>
2024-12-17 18:24
481K
Bicliques for Preima..>
2024-12-17 18:24
492K
Unaligned rebound at..>
2024-12-17 18:21
505K
NISTIR 8105 DRAFT_Re..>
2024-12-17 18:25
507K
The rebound attack_c..>
2024-12-17 18:21
512K
Deciphering Malwareâ..>
2024-12-17 18:17
513K
The first collision ..>
2024-12-17 18:21
518K
A Formal Security An..>
2024-12-17 18:17
555K
The rebound attack a..>
2024-12-17 18:20
583K
Updatable Encryption..>
2024-12-17 18:17
619K
Rebound attacks on t..>
2024-12-17 18:21
624K
How to improve rebou..>
2024-12-17 18:21
650K
On Collisions for MD..>
2024-12-17 18:25
651K
Plaintext-Recovery A..>
2024-12-17 18:25
703K
Optimal PRFs from Bl..>
2024-12-17 18:17
729K
A Real-time Inversio..>
2024-12-17 18:17
739K
Practical fault atta..>
2024-12-17 18:17
787K
To Decode Short Cryp..>
2024-12-17 18:25
791K
Improved Masking for..>
2024-12-17 18:17
834K
Color image encrypti..>
2024-12-17 18:23
1.1M
Imperfect Forward Se..>
2024-12-17 18:24
1.3M
Leaking beeps_unencr..>
2024-12-17 18:23
1.4M
Efficient zero-knowl..>
2024-12-17 18:23
1.8M
Cryptanalysis of AES..>
2024-12-17 18:20
2.0M
Learning to Read Enc..>
2024-12-17 18:23
2.2M
Side-Channel Attacks..>
2024-12-17 18:17
2.6M
Practical Forgeries ..>
2024-12-17 18:24
2.8M
ECDH key extraction ..>
2024-12-17 18:21
3.4M
Forward secrecy in T..>
2024-12-17 18:22
5.5M
Energy-efficient bcr..>
2024-12-17 18:21
6.8M
RSA key extraction v..>
2024-12-17 18:23
7.7M
Password security_pa..>
2024-12-17 18:22
8.7M
How can quantum cryp..>
2024-12-17 18:23
10M
Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12 Server at larren.zapto.org Port 80