DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Poly1305

Poly1305

  • FIPS 140-2 Non-Proprietary Security Policy

    FIPS 140-2 Non-Proprietary Security Policy

  • The Missing Difference Problem, and Its Applications to Counter Mode

    The Missing Difference Problem, and Its Applications to Counter Mode

  • On Comparing Side‑Channel Properties of AES and Chacha20 on Microcontrollers

    On Comparing Side‑Channel Properties of AES and Chacha20 on Microcontrollers

  • Stream Cipher Designs: a Review

    Stream Cipher Designs: a Review

  • Deriving Chacha20 Key Streams from Targeted Memory Analysis

    Deriving Chacha20 Key Streams from Targeted Memory Analysis

  • Optimizing Authenticated Encryption Algorithms

    Optimizing Authenticated Encryption Algorithms

  • Primus HSM E-Series

    Primus HSM E-Series

  • Chacha20 and Poly1305 Cipher Suites for TLS

    Chacha20 and Poly1305 Cipher Suites for TLS

  • Mackerel: a Progressive School of Cryptographic Thought

    Mackerel: a Progressive School of Cryptographic Thought

  • Bad Cryptography Bruce Barnett Who Am I?

    Bad Cryptography Bruce Barnett Who Am I?

  • Performance of Message Authentication Codes for Secure Ethernet

    Performance of Message Authentication Codes for Secure Ethernet

  • Committing Authenticated Encryption

    Committing Authenticated Encryption

  • A Side-Channel Analysis on the Chacha Quarter Round

    A Side-Channel Analysis on the Chacha Quarter Round

  • Legacy STM32 Cryptographic Library

    Legacy STM32 Cryptographic Library

  • Chacha20-Poly1305 Authenticated Encryption for High-Speed Embedded Iot Applications

    Chacha20-Poly1305 Authenticated Encryption for High-Speed Embedded Iot Applications

  • Comparison of Symmetric Key Algorithms for Iot Devices

    Comparison of Symmetric Key Algorithms for Iot Devices

  • Ensemble Approach to Failure-Resistant Password-Based Key Derivation Functions

    Ensemble Approach to Failure-Resistant Password-Based Key Derivation Functions

  • Limits on Authenticated Encryption Use in TLS

    Limits on Authenticated Encryption Use in TLS

Top View
  • Symmetric Key – English (Open Source)
  • TLS Upgrade Guideline
  • Cyclonecrypto | Embedded Cryptographic Toolkit for ARM
  • Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
  • The Security Impact of a New Cryptographic Library
  • LNCS 3557, Pp
  • TLS 1.3 and TLS 1.2 Comparison Whitepaper
  • A Surfeit of SSH Cipher Suites
  • The Design and Analysis of Symmetric Cryptosystems
  • High-Throughput Low-Area Hardware Design of Authenticated Encryption with Associated Data Cryptosystem That Uses Cha Cha20 and Poly1305
  • Crypto Copyright © 1999-2018 Ericsson AB
  • Post Quantum Secure Authentication Methods Suitable for Quantum Key Distribution
  • Open Source Internet Security
  • Draft-Aanchal4-Ntp-Mac-02 NTS
  • K97098157: SSL Ciphers Supported on BIG-IP Platforms (14.X)
  • Poly1305-AES MAC
  • Chacha20 & Poly1305
  • Physical Side-Channel Analysis of Chacha20-Poly1305


© 2024 Docslib.org    Feedback