ECRYPT

Results: 169



#Item
1

PDF Document

Add to Reading List

Source URL: www.ecrypt.eu.org

- Date: 2018-04-19 07:01:52
    2

    ISTECRYPT European Network of Excellence in Cryptology Network of Excellence Information Society Technologies

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2008-11-19 10:24:39
      3

      ECRYPT Hash Workshop 2011

      Add to Reading List

      Source URL: fse2011.mat.dtu.dk

      - Date: 2010-12-07 05:46:54
        4

        H2020-ICT-2014 – ProjectECRYPT – CSA ECRYPT – Coordination & Support Action D5.2 Algorithms, Key Size and Protocols Report

        Add to Reading List

        Source URL: www.ecrypt.eu.org

        - Date: 2016-10-22 12:38:28
          5

          Silicon Implementation of SHA-3 Finalists: BLAKE, Grøstl, JH, Keccak and Skein Xu Guo, Meeta Srivastav, Sinan Huang, Dinesh Ganta, Michael B. Henry, Leyla Nazhandali and Patrick Schaumont Center for Embedded Systems for

          Add to Reading List

          Source URL: www.ecrypt.eu.org

          Language: English - Date: 2011-05-19 03:02:40
            6

            Workshop on Symmetric Cryptanalysis 8-10 August 2011 Redmond, USA Follow the spirit of ECRYPT, ESC, and SHA-3 retreats: Talks (1 day): present your

            Add to Reading List

            Source URL: fse2011.mat.dtu.dk

            - Date: 2011-02-14 09:01:56
              7

              The Geometry of Rings Chris Peikert Georgia Institute of Technology ECRYPT II Summer School on Lattices Porto, Portugal

              Add to Reading List

              Source URL: web.eecs.umich.edu

              Language: English - Date: 2015-09-08 16:32:08
                8

                ECRYPT II   ICTECRYPT II European Network of Excellence in Cryptology II

                Add to Reading List

                Source URL: www.ecrypt.eu.org

                Language: English - Date: 2010-08-27 16:04:13
                  9Cryptography / Stream ciphers / Cryptographic hash functions / Message authentication codes / VEST / A5/1 / Data Encryption Standard / Block cipher modes of operation / Confusion and diffusion / Crypt / Rabbit / Key size

                  The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

                  Add to Reading List

                  Source URL: www.ecrypt.eu.org

                  Language: English - Date: 2007-03-29 16:18:56
                  10

                  School on Block Ciphers and Physical Security of Crypto Devices – Joint ECRYPT II SymLab and VAMPIRE summer school, targeting PhD students, post-docs, and young researchers in general

                  Add to Reading List

                  Source URL: fse2011.mat.dtu.dk

                  - Date: 2011-03-01 04:41:16
                    UPDATE