DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Cryptographic primitive

Cryptographic primitive

  • The First Collision for Full SHA-1

    The First Collision for Full SHA-1

  • FPGA Parallel-Pipelined AES-GCM Core for 100G Ethernet Applications

    FPGA Parallel-Pipelined AES-GCM Core for 100G Ethernet Applications

  • Julius: Secure Mode of Operation for Authenticated Encryption Based on ECB and Finite Field Multiplications

    Julius: Secure Mode of Operation for Authenticated Encryption Based on ECB and Finite Field Multiplications

  • Algebraic Frameworks for Cryptographic Primitives

    Algebraic Frameworks for Cryptographic Primitives

  • Cryptographic Sponge Functions

    Cryptographic Sponge Functions

  • A Matter of Security, Privacy and Trust

    A Matter of Security, Privacy and Trust

  • Chapter 1. Introducing Cryptography and ICSF

    Chapter 1. Introducing Cryptography and ICSF

  • Securing Audio Using AES-Based Authenticated Encryption with Python

    Securing Audio Using AES-Based Authenticated Encryption with Python

  • Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain

    Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain

  • Analysis of Key Management in Matrix

    Analysis of Key Management in Matrix

  • School of Electrical Engineering & Computer Science Oregon State

    School of Electrical Engineering & Computer Science Oregon State

  • Regeldokument

    Regeldokument

  • The Signal Protocol for Non-Cryptographers

    The Signal Protocol for Non-Cryptographers

  • AES-GCM for Efficient Authenticated Encryption – Ending the Reign of HMAC-SHA-1?

    AES-GCM for Efficient Authenticated Encryption – Ending the Reign of HMAC-SHA-1?

  • Security Amplification for Interactive Cryptographic Primitives

    Security Amplification for Interactive Cryptographic Primitives

  • Provably Secure Cryptographic Hash Functions

    Provably Secure Cryptographic Hash Functions

  • A Cryptographic Primitive Based on Hidden-Order Groups

    A Cryptographic Primitive Based on Hidden-Order Groups

  • On the End-To-End Security of Group Chats in Instant Messaging Protocols

    On the End-To-End Security of Group Chats in Instant Messaging Protocols

Top View
  • A Security Analysis of the Signal Protocol's Group Messaging
  • Sponges and Engines an Introduction to Keccak and Keyak Jos Wetzels, Wouter Bokslag
  • Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms
  • Verification of a Cryptographic Primitive: SHA-256
  • Analysis and Design of Blockcipher Based Cryptographic Algorithms
  • Cryptanalysis of Dedicated Cryptographic Hash Functions
  • Multivariate Cryptographic Primitive Based on the Product of the Roots of a Polynomial Over a field
  • CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption
  • Techniques and Solutions for Addressing Ransomware Attacks
  • Cryptographic Hash Functions
  • A Survey of Lightweight Cryptographic Hash Function Baraa Tareq Hammad, Norziana Jamil, Mohd Ezanee Rusli and Muhammad Reza Z`Aba
  • Ville Vehkaoja END-TO-END ENCRYPTION PROTOCOL for INTERNET of THINGS DEVICES
  • Building a Collision-Resistant Compression Function from Non-Compressing Primitives
  • A Performance Evaluation of Post-Quantum Cryptography in the Signal Protocol En Prestandautvärdering Av Kvantsäkert Krypto I Signal- Protokollet
  • SOGIS Agreed Cryptographic Mechanisms
  • Hash Functions: Theory, Attacks, and Applications
  • A Second Edition: Verification of a Cryptographic Primitive: SHA-256
  • Developer Cryptography Mistakes


© 2024 Docslib.org    Feedback