Index of /pdf/Whitepaper/Crypto/


../
NORX/                                              05-Jan-2021 15:46                   -
A Formal Security Analysis of the Signal Messag..> 10-Jun-2017 21:17              568587
A High Throughput_Gate AES Hardware Architectur..> 27-Aug-2016 08:38              492600
A Real-time Inversion Attack on the GMR-2 Ciphe..> 07-Jul-2017 11:39              757018
A Simple Power Analysis Attack on the Serpent K..> 10-Aug-2017 21:46              160804
A riddle wrapped in an Enigma - Neal Koblitz, A..> 08-Mar-2016 00:37              443318
AES-GCM-SIV: Specification and Analysis - Shay ..> 17-Jul-2017 20:25              577130
An Overview of Side Channel Attacks and Its Cou..> 12-May-2017 23:52              388991
Analysis of SHA-512_224 and SHA-512_256 - Chris..> 02-Jan-2017 15:19              449316
Are your passwords safe_energy-efficient bcrypt..> 02-Jan-2017 22:03              273914
Attack on Sun's MIDP reference implementation o..> 24-Feb-2016 20:57              445242
Balloon Hashing: A Memory-Hard Function Providi..> 14-Jun-2017 19:36              771116
Bicliques for Preimages_Attacks on Skein-512 an..> 17-Feb-2016 15:21              503524
Breaking and repairing GCM security proofs - Te..> 10-Apr-2016 10:33              341120
Chosen-prefix collisions for MD5 and colliding ..> 21-Dec-2016 22:53              276550
Color image encryption using spiral encoding te..> 23-Oct-2016 18:25             1173098
Console hacking 2010 - fail0verflow.pdf            03-Mar-2016 19:37             9151783
Cryptanalysis of AES-based hash functions - Mar..> 02-Jan-2017 15:16             2059202
Cryptographic Hash-Function Basics: Definitions..> 22-Aug-2017 22:47              226143
Cycling attacks on GCM, GHASH and other polynom..> 24-Feb-2016 23:40              325736
Deciphering Malware’s use of TLS (without Decry..> 23-Jun-2017 21:11              524998
Differential Power Analysis - Paul Kocher, Josh..> 13-Jun-2017 22:10              222534
ECDH key extraction via low-bandwidth electroma..> 06-Jan-2017 01:19             3583844
Ed448-Goldilocks, a new elliptic curve - Mike H..> 21-May-2017 16:05              254510
Efficient ephemeral elliptic curve cryptographi..> 11-Oct-2016 20:32              398438
Efficient zero-knowledge proofs - Jens Groth.pdf   03-Nov-2016 18:54             1843219
Energy-efficient bcrypt cracking - Katja Malvon..> 02-Jan-2017 22:02             7180764
Farfalle: parallel permutation-based cryptograp..> 18-Jul-2017 21:39              407492
Faster and timing-attack resistant AES-GCM - Em..> 21-Nov-2016 00:50              246113
Forward secrecy in TLS_A systematic study - Nic..> 03-Nov-2016 18:54             5812763
GCM security bounds reconsidered - Yuichi Niwa,..> 28-Feb-2016 15:04              286300
GCM, GHASH and weak keys - Markku-Juhani O. Saa..> 26-Feb-2016 14:20              228535
GIMLI: a cross-platform permutation - Daniel J...> 22-Aug-2017 19:49              728300
Grafting Trees: a Fault Attack against the SPHI..> 26-Dec-2020 22:40              440631
HACL: A Verified Modern Cryptographic Library -..> 16-Jun-2017 13:49              642383
High-speed implementation of bcrypt password se..> 02-Jan-2017 16:38              281847
How can quantum cryptography contribute to cybe..> 03-Nov-2016 18:55            10446019
How to improve rebound attacks - Marı́a Naya-Pl..> 02-Jan-2017 15:16              665338
Imperfect Forward Secrecy_How Diffie-Hellman Fa..> 10-May-2016 18:13             1386629
Imperfect forward secrecy_how Diffie-Hellman fa..> 17-Jan-2017 20:04             1386629
Improved Masking for Tweakable Blockciphers wit..> 16-Jun-2017 14:05              854380
Key Recovery Attacks of Practical Complexity on..> 16-May-2017 12:24              299252
Key-Recovery Attacks on Universal Hash Function..> 27-Aug-2016 08:38              228502
Leaking beeps_unencrypted pager messages in ind..> 26-Oct-2016 21:26             1458871
Learning to Read Encrypted VoIP Conversations -..> 28-Aug-2016 12:13             2329161
NISTIR 8105 DRAFT_Report on Post-Quantum Crypto..> 15-Feb-2016 17:09              518837
Not-quite-so-broken TLS 1.3 mechanised conforma..> 05-Nov-2016 22:48              203705
Note on side-channel attacks and their counterm..> 18-Mar-2017 14:42              110322
On Collisions for MD5 - M.M.J. Stevens.pdf         15-Feb-2016 18:33              666661
On the Possibility of a Back Door in the NIST S..> 23-Dec-2015 10:54               58042
On weak keys and forgery attacks against polyno..> 26-Feb-2016 14:17              443866
Optimal PRFs from Blockcipher Designs - Bart Me..> 30-Aug-2017 07:55              746440
Ouroboros: a simple, secure and efficient key e..> 04-Jul-2017 08:09             1644126
Password Interception in a SSL_TLS Channel - Br..> 06-Nov-2016 16:19              166078
Password security_past, present, future (with s..> 07-Sep-2016 15:14             9104022
Plaintext-Recovery Attacks Against Datagram TLS..> 25-May-2016 16:07              720291
Post-quantum RSA - Daniel J. Bernstein, Nadia H..> 15-Jun-2017 10:42              363674
Practical Cryptanalysis of PAES - Jérémy Jean, ..> 04-Oct-2016 12:06              368259
Practical Forgeries and Distinguishers against ..> 04-Oct-2016 12:06             2883759
Practical fault attack against the Ed25519 and ..> 26-Dec-2020 22:40              806310
Practical-titled attack on AES-128 using chosen..> 21-Feb-2016 23:20               61973
Preimage and pseudo-Collision attacks on step-r..> 02-Jan-2017 15:38              178914
RSA key extraction via low-bandwidth acoustic c..> 04-Nov-2016 11:36             8087109
Random Oracles are Practical: A Paradigm for De..> 10-Aug-2017 21:40              283342
Rebound attacks on the reduced Grøstl hash func..> 02-Jan-2017 15:16              639223
Revisiting MAC forgeries, weak keys and provabl..> 26-Feb-2016 14:21              354470
Security dangers of the NIST curves - Daniel J...> 03-Mar-2016 18:51              296866
Security flaws induced by CBC padding applicati..> 06-Nov-2016 16:19              128649
Selecting cryptographics key sizes - Arjen K. L..> 11-Oct-2016 20:32              148934
Side-Channel Attacks on BLISS Lattice-Based Sig..> 09-Jun-2017 21:45             2742895
TEMPEST attacks against AES: Covertly stealing ..> 23-Jun-2017 21:31             2147462
The EAX mode of operation - M. Bellare, P. Roga..> 08-Mar-2016 08:35              741603
The Twofish team's final comments on AES select..> 06-Jan-2017 00:56              149726
The first collision for full SHA-1 - Marc Steve..> 23-Feb-2017 14:33              530778
The fragility of AES-GCM authentication algorit..> 24-May-2016 13:17              428917
The number field sieve for integers of low weig..> 21-Jan-2017 14:35              229519
The rebound attack and subspace distinguishers_..> 02-Jan-2017 15:16              596585
The rebound attack_cryptanalysis of reduced Whi..> 02-Jan-2017 15:16              524556
The security and performance of the Galois Coun..> 24-Feb-2016 23:42              274361
Timing Attacks on Implementations of Diffe-Hell..> 26-Dec-2020 22:40              211673
To Decode Short Cryptograms - George W. Hart.pdf   20-Feb-2016 19:59              809582
Towards Practical Attacks on Argon2i and Balloo..> 14-Jun-2017 19:36              492598
Unaligned rebound attack_application to Keccak ..> 02-Jan-2017 15:16              517098
Updatable Encryption with Post-Compromise Secur..> 26-Dec-2020 22:40              633453
Using AES Round Symmetries to Distinguish PAES ..> 04-Oct-2016 12:06              272516