DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Cryptographic primitive
Cryptographic primitive
The First Collision for Full SHA-1
FPGA Parallel-Pipelined AES-GCM Core for 100G Ethernet Applications
Julius: Secure Mode of Operation for Authenticated Encryption Based on ECB and Finite Field Multiplications
Algebraic Frameworks for Cryptographic Primitives
Cryptographic Sponge Functions
A Matter of Security, Privacy and Trust
Chapter 1. Introducing Cryptography and ICSF
Securing Audio Using AES-Based Authenticated Encryption with Python
Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain
Analysis of Key Management in Matrix
School of Electrical Engineering & Computer Science Oregon State
Regeldokument
The Signal Protocol for Non-Cryptographers
AES-GCM for Efficient Authenticated Encryption – Ending the Reign of HMAC-SHA-1?
Security Amplification for Interactive Cryptographic Primitives
Provably Secure Cryptographic Hash Functions
A Cryptographic Primitive Based on Hidden-Order Groups
On the End-To-End Security of Group Chats in Instant Messaging Protocols
Top View
A Security Analysis of the Signal Protocol's Group Messaging
Sponges and Engines an Introduction to Keccak and Keyak Jos Wetzels, Wouter Bokslag
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms
Verification of a Cryptographic Primitive: SHA-256
Analysis and Design of Blockcipher Based Cryptographic Algorithms
Cryptanalysis of Dedicated Cryptographic Hash Functions
Multivariate Cryptographic Primitive Based on the Product of the Roots of a Polynomial Over a field
CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption
Techniques and Solutions for Addressing Ransomware Attacks
Cryptographic Hash Functions
A Survey of Lightweight Cryptographic Hash Function Baraa Tareq Hammad, Norziana Jamil, Mohd Ezanee Rusli and Muhammad Reza Z`Aba
Ville Vehkaoja END-TO-END ENCRYPTION PROTOCOL for INTERNET of THINGS DEVICES
Building a Collision-Resistant Compression Function from Non-Compressing Primitives
A Performance Evaluation of Post-Quantum Cryptography in the Signal Protocol En Prestandautvärdering Av Kvantsäkert Krypto I Signal- Protokollet
SOGIS Agreed Cryptographic Mechanisms
Hash Functions: Theory, Attacks, and Applications
A Second Edition: Verification of a Cryptographic Primitive: SHA-256
Developer Cryptography Mistakes