DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» NaCl (software)
NaCl (software)
Nacl's Crypto Box in Hardware
Comparing the Usability of Cryptographic Apis
Pynacl Release 1.4.0.Dev1
Libsodium V1.0.12 and V1.0.13 Security Assessment
Pynacl Release 1.2.0.Dev1
How to Correctly Use and Implement Cryptographic Primitives
Securing Communication
Developer Cryptography Best Practices
Nacl on 8-Bit AVR Microcontrollers
Efficient Implementation of the SHA-512 Hash
Secure Software Systems CYBR 200 | Fall 2018 | University of the Pacific | Jeff Shafer
Cryptography in Nacl
Salsa20 and Chacha in Deterministic Authenticated Encryption with No Noncense
Chacha20-Poly1305 Authenticated Encryption for High-Speed Embedded Iot Applications
Design and Analysis of Symmetric Cryptographic Algorithms
Pynacl Release 1.1.0
Secure Policy-Based Communication for Iot Devices on LAN, As Implemented by Trifork
The Security Impact of a New Cryptographic Library
Top View
Pynacl Release 1.4.0.Dev1
How Usable Are Rust Cryptography Apis?
Pynacl Release 1.3.0.Dev1
Gimli 20190329
TMS Cryptography Pack DEVELOPERS GUIDE
High-Throughput Low-Area Hardware Design of Authenticated Encryption with Associated Data Cryptosystem That Uses Cha Cha20 and Poly1305
Pynacl Release 1.1.1
Libnacl Documentation Release 1.4.3
Gimli Specification
Efficient Implementation of the SHA-512 Hash Function for 8-Bit
The KISS Principle in Software-Defined Networking
Hunting Invisible Salamanders: Cryptographic (In)Security with Attacker-Controlled Keys Paul Grubbs Cornell Tech, New York University, University of Michigan
High-Level Cryptographic Abstractions
Nacl's Crypto Box in Hardware
The Security Impact of a New Cryptographic Library
HACL: a Verified Modern Cryptographic Library
Nacl on 8-Bit AVR Microcontrollers
Comments Received on Draft FIPS 186-5: Digital Signature Standards (DSS) (January 29, 2020 Deadline) Updated 3/19/2021
Botan Reference Guide Release 2.18.1
HACL *: a Verified Modern Cryptographic Library
The Security Impact of a New Cryptographic Library
2 Secret Key Encryption 7 2.1 Example