Cryptographic primitive
Top View
- A Security Analysis of the Signal Protocol's Group Messaging
- Sponges and Engines an Introduction to Keccak and Keyak Jos Wetzels, Wouter Bokslag
- Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms
- Verification of a Cryptographic Primitive: SHA-256
- Analysis and Design of Blockcipher Based Cryptographic Algorithms
- Cryptanalysis of Dedicated Cryptographic Hash Functions
- Multivariate Cryptographic Primitive Based on the Product of the Roots of a Polynomial Over a field
- CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption
- Techniques and Solutions for Addressing Ransomware Attacks
- Cryptographic Hash Functions
- A Survey of Lightweight Cryptographic Hash Function Baraa Tareq Hammad, Norziana Jamil, Mohd Ezanee Rusli and Muhammad Reza Z`Aba
- Ville Vehkaoja END-TO-END ENCRYPTION PROTOCOL for INTERNET of THINGS DEVICES
- Building a Collision-Resistant Compression Function from Non-Compressing Primitives
- A Performance Evaluation of Post-Quantum Cryptography in the Signal Protocol En Prestandautvärdering Av Kvantsäkert Krypto I Signal- Protokollet
- SOGIS Agreed Cryptographic Mechanisms
- Hash Functions: Theory, Attacks, and Applications
- A Second Edition: Verification of a Cryptographic Primitive: SHA-256
- Developer Cryptography Mistakes