DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Gilles Van Assche

Gilles Van Assche

  • Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3

    Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3

  • The Subterranean 2.0 Cipher Suite Joan Daemen, Pedro Maat Costa Massolino, Alireza Mehrdad, Yann Rotella

    The Subterranean 2.0 Cipher Suite Joan Daemen, Pedro Maat Costa Massolino, Alireza Mehrdad, Yann Rotella

  • Exploring NIST LWC/PQC Synergy with R5sneik How SNEIK 1.1 Algorithms Were Designed to Support Round5

    Exploring NIST LWC/PQC Synergy with R5sneik How SNEIK 1.1 Algorithms Were Designed to Support Round5

  • ISAP – Towards Side-Channel Secure Authenticated Encryption

    ISAP – Towards Side-Channel Secure Authenticated Encryption

  • Cryptanalysis of Symmetric Encryption Algorithms Colin Chaigneau

    Cryptanalysis of Symmetric Encryption Algorithms Colin Chaigneau

  • Stribobr2: “WHIRLBOB”

    Stribobr2: “WHIRLBOB”

  • Differential Propagation Analysis of Keccak

    Differential Propagation Analysis of Keccak

  • Quark: a Lightweight Hash∗

    Quark: a Lightweight Hash∗

  • Joan Daemen*, Gilles Van Assche*, Michael Peeters* and Vincent Rijmen**

    Joan Daemen*, Gilles Van Assche*, Michael Peeters* and Vincent Rijmen**

  • New Techniques for Trail Bounds and Application to Differential Trails In

    New Techniques for Trail Bounds and Application to Differential Trails In

  • Using Quantum Key Distribution for Cryptographic Purposes: Asurvey✩ ∗ R

    Using Quantum Key Distribution for Cryptographic Purposes: Asurvey✩ ∗ R

  • The Subterranean 2.0 Cipher Suite

    The Subterranean 2.0 Cipher Suite

  • Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers

    Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers

  • Gimli 20190329

    Gimli 20190329

  • Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition

    Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition

  • The Making of Keccak

    The Making of Keccak

  • Keccak Sponge Function Family Main Document

    Keccak Sponge Function Family Main Document

  • STRIBOB / WHIRLBOB Security Analysis Addendum Last Update: Tuesday 30Th June, 2015

    STRIBOB / WHIRLBOB Security Analysis Addendum Last Update: Tuesday 30Th June, 2015

Top View
  • Nessie Proposal: NOEKEON
  • Single-Trace Attacks on Keccak
  • Download Download
  • Ciphers for Mpc and Fhe
  • Hidden Structures and Quantum Cryptanalysis Xavier Bonnetain
  • Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers


© 2024 Docslib.org    Feedback