DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Poly1305
Poly1305
FIPS 140-2 Non-Proprietary Security Policy
The Missing Difference Problem, and Its Applications to Counter Mode
On Comparing Side‑Channel Properties of AES and Chacha20 on Microcontrollers
Stream Cipher Designs: a Review
Deriving Chacha20 Key Streams from Targeted Memory Analysis
Optimizing Authenticated Encryption Algorithms
Primus HSM E-Series
Chacha20 and Poly1305 Cipher Suites for TLS
Mackerel: a Progressive School of Cryptographic Thought
Bad Cryptography Bruce Barnett Who Am I?
Performance of Message Authentication Codes for Secure Ethernet
Committing Authenticated Encryption
A Side-Channel Analysis on the Chacha Quarter Round
Legacy STM32 Cryptographic Library
Chacha20-Poly1305 Authenticated Encryption for High-Speed Embedded Iot Applications
Comparison of Symmetric Key Algorithms for Iot Devices
Ensemble Approach to Failure-Resistant Password-Based Key Derivation Functions
Limits on Authenticated Encryption Use in TLS
Top View
Symmetric Key – English (Open Source)
TLS Upgrade Guideline
Cyclonecrypto | Embedded Cryptographic Toolkit for ARM
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
The Security Impact of a New Cryptographic Library
LNCS 3557, Pp
TLS 1.3 and TLS 1.2 Comparison Whitepaper
A Surfeit of SSH Cipher Suites
The Design and Analysis of Symmetric Cryptosystems
High-Throughput Low-Area Hardware Design of Authenticated Encryption with Associated Data Cryptosystem That Uses Cha Cha20 and Poly1305
Crypto Copyright © 1999-2018 Ericsson AB
Post Quantum Secure Authentication Methods Suitable for Quantum Key Distribution
Open Source Internet Security
Draft-Aanchal4-Ntp-Mac-02 NTS
K97098157: SSL Ciphers Supported on BIG-IP Platforms (14.X)
Poly1305-AES MAC
Chacha20 & Poly1305
Physical Side-Channel Analysis of Chacha20-Poly1305
Guidelines on Cryptographic Algorithms Usage and Key Management
Hunting Invisible Salamanders: Cryptographic (In)Security with Attacker-Controlled Keys Paul Grubbs Cornell Tech, New York University, University of Michigan
Chaskey: a Lightweight MAC Algorithm for Microcontrollers⋆
An Analytic Attack Against ARX Addition Exploiting Standard Side-Channel Leakage
Security Analysis of Chacha20-Poly1305 AEAD
The Libgcrypt Reference Manual Version 1.9.0 18 January 2021
Cryptography in Python Hashes, ECC and ECDSA, Eth Keys Library ECDSA in Python: Generate / Load Keys
Message Authentication on 64-Bit Architectures
STIX Version 2.0. Part 3: Cyber Observable Core Concepts
A Security Analysis of the Composition of Chacha20 and Poly1305
The Poly1305-AES Message-Authentication Code
Boosting Authenticated Encryption Robustness with Minimal Modifications
Too Much Crypto
Formal Security Proofs of Cryptographic Standards Cécile Baritel-Ruet
Post-Quantum Cryptography
Freestyle, a Randomized Version of Chacha for Resisting Offline Brute-Force and Dictionary Attacks P
Improved SIMD Implementation of Poly1305
Siphash: a Fast Short-Input PRF
The Poly1305-AES Message-Authentication Code D. J. Bernstein