[mirror] Crypto stuff. Don't use.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
odzhan f5c1beecb6 upd 1 year ago
..
09-ecc.pdf upd 1 year ago
12 Side Channel Attacks and Countermeasures.pdf upd 1 year ago
A Certified Digital Signature.pdf upd 1 year ago
A Construction of a Cipher from a Single Pseudorandom Permutation.pdf upd 1 year ago
A Framework for Iterative Hash Functions HAIFA.pdf upd 1 year ago
A Graduate Course in Applied Cryptography_0_4.pdf upd 1 year ago
A Proposal for a New Block Encryption Standard.pdf upd 1 year ago
A Simple Related-Key Attack on the Full SHACAL-1.pdf upd 1 year ago
A Stream Cipher Construction Inspired by Block Cipher Design Principles.pdf upd 1 year ago
A salad of block ciphers.pdf upd 1 year ago
Advanced Slide Attacks.pdf upd 1 year ago
Building Hash Functions from Block.pdf upd 1 year ago
CRC.Press.Crypto.Nov.2014.ISBN.1482228890.pdf upd 1 year ago
Comparing Elliptic Curve Cryptography and.pdf upd 1 year ago
Compiler Optimizations as a Countermeasure against side-channel analysis.pdf upd 1 year ago
Counting points on elliptic curves over Zp.pdf upd 1 year ago
Damgard- A Design Principle for Hash Functions.pdf upd 1 year ago
EldibW14CAV.pdf upd 1 year ago
Elliptic Curve Cryptography (2).pdf upd 1 year ago
Elliptic Curve Cryptography.pdf upd 1 year ago
Elliptic Curve Handbook.pdf upd 1 year ago
Elliptic_Curve_AnnopMS.pdf upd 1 year ago
Exhaustive Cryptanalysis of the NBS Data Encryption Standard.pdf upd 1 year ago
FaCT_SecDev17_without_animations.pdf upd 1 year ago
Generic Implementations of Elliptic Curve Cryptography.pdf upd 1 year ago
HANDBOOK of applied cryptography.pdf upd 1 year ago
Handout_Elliptic_Curve_Crypto.pdf upd 1 year ago
Hash Functions Based on Block Ciphers and Quaternary Codes.pdf upd 1 year ago
Hash Functions Based on Block Ciphers.pdf upd 1 year ago
Hash function based on block cipher.pdf upd 1 year ago
Hash functions and MAC algorithms.pdf upd 1 year ago
Hash functions based on block ciphers_1993.pdf upd 1 year ago
Hero_Modares_thesis_11_11_09.pdf upd 1 year ago
How to Protect DES Against Exhaustive Key Search.pdf upd 1 year ago
Improved Slide Attacks.pdf upd 1 year ago
New Results on Boomerang and Rectangle Attacks.pdf upd 1 year ago
New Types of Cryptanalytic Attacks Using Related Keys.pdf upd 1 year ago
NoteSideChannelAttacks.pdf upd 1 year ago
Related-Key Boomerang and Rectangle Attacks.pdf upd 1 year ago
Remote Timing Attacks are Practical.pdf upd 1 year ago
Report on Lightweight Cryptography.pdf upd 1 year ago
Rotational Cryptanalysis of ARX.pdf upd 1 year ago
SECRECY, AUTHENTICATION, AND PUBLIC KEY SYSTEMS.pdf upd 1 year ago
Slide Attack on SHACAL-1.pdf upd 1 year ago
Software Implementation of Elliptic Curves over Prime Fields.pdf upd 1 year ago
Software Implementations of Elliptic Curve Cryptography.pdf upd 1 year ago
Standards for Efficient Cryptography.pdf upd 1 year ago
State of the Art in Lightweight Symmetric Cryptography.pdf upd 1 year ago
The Rectangle Attack Rectangling the Serpent.pdf upd 1 year ago
The Security of DESX.pdf upd 1 year ago
The road from Panama to Keccak via RadioGatun.pdf upd 1 year ago
Topics in Cryptology 2003.pdf upd 1 year ago
WP_Entrust_Zero-to-ECC_March2014.pdf upd 1 year ago
book.zip upd 1 year ago
cill2.pdf upd 1 year ago
constant_time_crypto.pdf upd 1 year ago
constant_time_modular_inversion.pdf upd 1 year ago
crypto101.pdf upd 1 year ago
dude_is_my_code_constant_time.pdf upd 1 year ago
fact_flexible_constant_time.pdf upd 1 year ago
hill.pdf upd 1 year ago
lecture16-branch-prediction.pdf upd 1 year ago
mcbits-20130616.pdf upd 1 year ago
nist_report.pdf upd 1 year ago
practical_mitigations_xs86.pdf upd 1 year ago
remote_timing_attacks.pdf upd 1 year ago
square.pdf upd 1 year ago
timing_attacks_countermeasures.pdf upd 1 year ago