DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Cryptographic primitive
Cryptographic primitive
The First Collision for Full SHA-1
FPGA Parallel-Pipelined AES-GCM Core for 100G Ethernet Applications
Julius: Secure Mode of Operation for Authenticated Encryption Based on ECB and Finite Field Multiplications
Algebraic Frameworks for Cryptographic Primitives
Cryptographic Sponge Functions
A Matter of Security, Privacy and Trust
Chapter 1. Introducing Cryptography and ICSF
Securing Audio Using AES-Based Authenticated Encryption with Python
Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain
Analysis of Key Management in Matrix
School of Electrical Engineering & Computer Science Oregon State
Regeldokument
The Signal Protocol for Non-Cryptographers
AES-GCM for Efficient Authenticated Encryption – Ending the Reign of HMAC-SHA-1?
Security Amplification for Interactive Cryptographic Primitives
Provably Secure Cryptographic Hash Functions
A Cryptographic Primitive Based on Hidden-Order Groups
On the End-To-End Security of Group Chats in Instant Messaging Protocols
Top View
A Security Analysis of the Signal Protocol's Group Messaging
Sponges and Engines an Introduction to Keccak and Keyak Jos Wetzels, Wouter Bokslag
Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms
Verification of a Cryptographic Primitive: SHA-256
Analysis and Design of Blockcipher Based Cryptographic Algorithms
Cryptanalysis of Dedicated Cryptographic Hash Functions
Multivariate Cryptographic Primitive Based on the Product of the Roots of a Polynomial Over a field
CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption
Techniques and Solutions for Addressing Ransomware Attacks
Cryptographic Hash Functions
A Survey of Lightweight Cryptographic Hash Function Baraa Tareq Hammad, Norziana Jamil, Mohd Ezanee Rusli and Muhammad Reza Z`Aba
Ville Vehkaoja END-TO-END ENCRYPTION PROTOCOL for INTERNET of THINGS DEVICES
Building a Collision-Resistant Compression Function from Non-Compressing Primitives
A Performance Evaluation of Post-Quantum Cryptography in the Signal Protocol En Prestandautvärdering Av Kvantsäkert Krypto I Signal- Protokollet
SOGIS Agreed Cryptographic Mechanisms
Hash Functions: Theory, Attacks, and Applications
A Second Edition: Verification of a Cryptographic Primitive: SHA-256
Developer Cryptography Mistakes
Cryptographic Hash Functions
Bruce Schneier
Implementation of Lightweight Cryptographic Primitives
IV = 0 Security Cryptographic Misuse of Libraries
Arxiv:2004.09713V2 [Cs.CR] 22 Apr 2020
Comparison of Multi-Purpose Cores of Keccak And
Remarks on the Cryptographic Primitive of Attribute-Based Encryption
Optimal Prfs from Blockcipher Designs
Threshold Schemes for Cryptographic Primitives Challenges and Opportunities in Standardization and Validation of Threshold Cryptography
Design Principles for Dedicated Hash Functions
Formal Verification for Real-World Cryptographic Protocols and Implementations Nadim Kobeissi
Towards NIST Standards for Threshold Schemes For
Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers †
Cryptoknight: Generating and Modelling Compiled Cryptographic Primitives
Provable Security of Cryptographic Hash Functions
Design and Analysis of Symmetric Primitives
ARMADILLO Parameters Security Hardware Conclusions
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol
SHA-1 Is a Shambles First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols
Fast Encryption and Authentication in a Single Cryptographic Primitive 1
Identification of Cryptographic Algorithms in Binary Programs Pierre Lestringant
Lecture 18: Cryptographic Hash Functions, Message Authentication Codes
Speeding up Detection of SHA-1 Collision Attacks Using Unavoidable
Cryptographic Hash Functions: Cryptanalysis, Design and Applications
NIST.SP.800-175Br1.Pdf
ARMADILLO: a Multi-Purpose Cryptographic Primitive Dedicated to Hardware
Comments on Hash Function Criteria
Building a Secure Record Protocol from a Cryptographic Sponge Permutation
Assignment of Bachelor's Thesis
LOKI - a Cryptographic Primitive for Authentication and Secrecy Applications