Index of /pdf/Whitepaper/Crypto/
../
NORX/ 05-Jan-2021 15:46 -
A Formal Security Analysis of the Signal Messag..> 10-Jun-2017 21:17 568587
A High Throughput_Gate AES Hardware Architectur..> 27-Aug-2016 08:38 492600
A Real-time Inversion Attack on the GMR-2 Ciphe..> 07-Jul-2017 11:39 757018
A Simple Power Analysis Attack on the Serpent K..> 10-Aug-2017 21:46 160804
A riddle wrapped in an Enigma - Neal Koblitz, A..> 08-Mar-2016 00:37 443318
AES-GCM-SIV: Specification and Analysis - Shay ..> 17-Jul-2017 20:25 577130
An Overview of Side Channel Attacks and Its Cou..> 12-May-2017 23:52 388991
Analysis of SHA-512_224 and SHA-512_256 - Chris..> 02-Jan-2017 15:19 449316
Are your passwords safe_energy-efficient bcrypt..> 02-Jan-2017 22:03 273914
Attack on Sun's MIDP reference implementation o..> 24-Feb-2016 20:57 445242
Balloon Hashing: A Memory-Hard Function Providi..> 14-Jun-2017 19:36 771116
Bicliques for Preimages_Attacks on Skein-512 an..> 17-Feb-2016 15:21 503524
Breaking and repairing GCM security proofs - Te..> 10-Apr-2016 10:33 341120
Chosen-prefix collisions for MD5 and colliding ..> 21-Dec-2016 22:53 276550
Color image encryption using spiral encoding te..> 23-Oct-2016 18:25 1173098
Console hacking 2010 - fail0verflow.pdf 03-Mar-2016 19:37 9151783
Cryptanalysis of AES-based hash functions - Mar..> 02-Jan-2017 15:16 2059202
Cryptographic Hash-Function Basics: Definitions..> 22-Aug-2017 22:47 226143
Cycling attacks on GCM, GHASH and other polynom..> 24-Feb-2016 23:40 325736
Deciphering Malware’s use of TLS (without Decry..> 23-Jun-2017 21:11 524998
Differential Power Analysis - Paul Kocher, Josh..> 13-Jun-2017 22:10 222534
ECDH key extraction via low-bandwidth electroma..> 06-Jan-2017 01:19 3583844
Ed448-Goldilocks, a new elliptic curve - Mike H..> 21-May-2017 16:05 254510
Efficient ephemeral elliptic curve cryptographi..> 11-Oct-2016 20:32 398438
Efficient zero-knowledge proofs - Jens Groth.pdf 03-Nov-2016 18:54 1843219
Energy-efficient bcrypt cracking - Katja Malvon..> 02-Jan-2017 22:02 7180764
Farfalle: parallel permutation-based cryptograp..> 18-Jul-2017 21:39 407492
Faster and timing-attack resistant AES-GCM - Em..> 21-Nov-2016 00:50 246113
Forward secrecy in TLS_A systematic study - Nic..> 03-Nov-2016 18:54 5812763
GCM security bounds reconsidered - Yuichi Niwa,..> 28-Feb-2016 15:04 286300
GCM, GHASH and weak keys - Markku-Juhani O. Saa..> 26-Feb-2016 14:20 228535
GIMLI: a cross-platform permutation - Daniel J...> 22-Aug-2017 19:49 728300
Grafting Trees: a Fault Attack against the SPHI..> 26-Dec-2020 22:40 440631
HACL: A Verified Modern Cryptographic Library -..> 16-Jun-2017 13:49 642383
High-speed implementation of bcrypt password se..> 02-Jan-2017 16:38 281847
How can quantum cryptography contribute to cybe..> 03-Nov-2016 18:55 10446019
How to improve rebound attacks - Marı́a Naya-Pl..> 02-Jan-2017 15:16 665338
Imperfect Forward Secrecy_How Diffie-Hellman Fa..> 10-May-2016 18:13 1386629
Imperfect forward secrecy_how Diffie-Hellman fa..> 17-Jan-2017 20:04 1386629
Improved Masking for Tweakable Blockciphers wit..> 16-Jun-2017 14:05 854380
Key Recovery Attacks of Practical Complexity on..> 16-May-2017 12:24 299252
Key-Recovery Attacks on Universal Hash Function..> 27-Aug-2016 08:38 228502
Leaking beeps_unencrypted pager messages in ind..> 26-Oct-2016 21:26 1458871
Learning to Read Encrypted VoIP Conversations -..> 28-Aug-2016 12:13 2329161
NISTIR 8105 DRAFT_Report on Post-Quantum Crypto..> 15-Feb-2016 17:09 518837
Not-quite-so-broken TLS 1.3 mechanised conforma..> 05-Nov-2016 22:48 203705
Note on side-channel attacks and their counterm..> 18-Mar-2017 14:42 110322
On Collisions for MD5 - M.M.J. Stevens.pdf 15-Feb-2016 18:33 666661
On the Possibility of a Back Door in the NIST S..> 23-Dec-2015 10:54 58042
On weak keys and forgery attacks against polyno..> 26-Feb-2016 14:17 443866
Optimal PRFs from Blockcipher Designs - Bart Me..> 30-Aug-2017 07:55 746440
Ouroboros: a simple, secure and efficient key e..> 04-Jul-2017 08:09 1644126
Password Interception in a SSL_TLS Channel - Br..> 06-Nov-2016 16:19 166078
Password security_past, present, future (with s..> 07-Sep-2016 15:14 9104022
Plaintext-Recovery Attacks Against Datagram TLS..> 25-May-2016 16:07 720291
Post-quantum RSA - Daniel J. Bernstein, Nadia H..> 15-Jun-2017 10:42 363674
Practical Cryptanalysis of PAES - Jérémy Jean, ..> 04-Oct-2016 12:06 368259
Practical Forgeries and Distinguishers against ..> 04-Oct-2016 12:06 2883759
Practical fault attack against the Ed25519 and ..> 26-Dec-2020 22:40 806310
Practical-titled attack on AES-128 using chosen..> 21-Feb-2016 23:20 61973
Preimage and pseudo-Collision attacks on step-r..> 02-Jan-2017 15:38 178914
RSA key extraction via low-bandwidth acoustic c..> 04-Nov-2016 11:36 8087109
Random Oracles are Practical: A Paradigm for De..> 10-Aug-2017 21:40 283342
Rebound attacks on the reduced Grøstl hash func..> 02-Jan-2017 15:16 639223
Revisiting MAC forgeries, weak keys and provabl..> 26-Feb-2016 14:21 354470
Security dangers of the NIST curves - Daniel J...> 03-Mar-2016 18:51 296866
Security flaws induced by CBC padding applicati..> 06-Nov-2016 16:19 128649
Selecting cryptographics key sizes - Arjen K. L..> 11-Oct-2016 20:32 148934
Side-Channel Attacks on BLISS Lattice-Based Sig..> 09-Jun-2017 21:45 2742895
TEMPEST attacks against AES: Covertly stealing ..> 23-Jun-2017 21:31 2147462
The EAX mode of operation - M. Bellare, P. Roga..> 08-Mar-2016 08:35 741603
The Twofish team's final comments on AES select..> 06-Jan-2017 00:56 149726
The first collision for full SHA-1 - Marc Steve..> 23-Feb-2017 14:33 530778
The fragility of AES-GCM authentication algorit..> 24-May-2016 13:17 428917
The number field sieve for integers of low weig..> 21-Jan-2017 14:35 229519
The rebound attack and subspace distinguishers_..> 02-Jan-2017 15:16 596585
The rebound attack_cryptanalysis of reduced Whi..> 02-Jan-2017 15:16 524556
The security and performance of the Galois Coun..> 24-Feb-2016 23:42 274361
Timing Attacks on Implementations of Diffe-Hell..> 26-Dec-2020 22:40 211673
To Decode Short Cryptograms - George W. Hart.pdf 20-Feb-2016 19:59 809582
Towards Practical Attacks on Argon2i and Balloo..> 14-Jun-2017 19:36 492598
Unaligned rebound attack_application to Keccak ..> 02-Jan-2017 15:16 517098
Updatable Encryption with Post-Compromise Secur..> 26-Dec-2020 22:40 633453
Using AES Round Symmetries to Distinguish PAES ..> 04-Oct-2016 12:06 272516