Cryptol

Results: 12



#Item
11Mathematics / Keccak / NIST hash function competition / Joan Daemen / SHA-1 / Cryptol / Function / MD5 / Preimage attack / Cryptography / Error detection and correction / Cryptographic hash functions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-01-29 09:04:53
12Block ciphers / CPU cache / Side channel attack / Ciphertext / Lookup table / ICE / UES / Tiny Encryption Algorithm / VEST / Cryptography / Data Encryption Standard / Advanced Encryption Standard

J. Cryptol. DOI: [removed]s00145[removed]y Efficient Cache Attacks on AES, and Countermeasures Eran Tromer Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Add to Reading List

Source URL: cs.tau.ac.il

Language: English - Date: 2009-07-26 00:46:34
UPDATE