IACR

Results: 2241



#Item
911Reconfigurable computing / Field-programmable gate array / Digital electronics / Altera / Xilinx / Application-specific integrated circuit / Electronic engineering / Fabless semiconductor companies / Electronics

On The Impact of Target Technology in SHA-3 Hardware Benchmark Rankings Version 2.0, November 18, 2010 Xu Guo, Sinan Huang, Leyla Nazhandali and Patrick Schaumont Bradley Department of Electrical and Computer Engineering

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-11-19 04:19:44
912Algebra / Mathematics / Elliptic curve / Affine space / Exponentiation / Hessian form of an elliptic curve / Table of costs of operations in elliptic curves / Abstract algebra / Elliptic curves / Elliptic curve cryptography

Countermeasures against side-channel attacks for EC cryptosystems 1 Countermeasures against Side-Channel Attacks for Elliptic Curve Cryptosystems*

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2001-11-23 07:00:41
913Finite fields / Key management / Public-key cryptography / Advantage / CBC-MAC / CMAC / Block cipher / Cipher / Key size / Cryptography / Message authentication codes / Block cipher modes of operation

Related-Key and Key-Collision Attacks Against RMAC Tadayoshi Kohno CSE Department, UC San Diego 9500 Gilman Drive, MC-0114 La Jolla, California, USA

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-12-02 19:59:21
914Analytic number theory / Elliptic curve / Group theory / Mathematics / Hash function / Cryptographic hash function / Information retrieval / Artificial intelligence / Boneh/Franklin scheme / Cryptography / Search algorithms / Hashing

Introduction Related Works Proposal Hashing Conclusion How to Hash into Elliptic Curves Thomas Icart

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-10-23 17:02:32
915Eurocrypt / Asiacrypt / International Cryptology Conference / Py / Year of birth missing / Tom Berson / Auditing / Corporate governance / PKC / Cryptography / Committees / Workshop on Cryptographic Hardware and Embedded Systems

MINUTES IACR BOARD MEETING CRYPTO’12 UCSB, 19 AUGUSTO PENING M ATTERS AtPreneel opens the meeting and he briefly goes around to confirm attendees and establish who is holding proxies. The agenda is appr

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2013-08-16 17:22:10
916Deduction / Q / Entailment / RC4 / I1 / Logic / Cryptography / Functional languages

Statistical weaknesses in the alleged RC4 keystream generator Marina Pudovkina Moscow Engineering Physics Institute (State University) Abstract. A large number of stream cipher were proposed and impleme

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-11-11 15:22:27
917Trivium / Linear cryptanalysis / Differential cryptanalysis / Stream ciphers / Grain / Cube attack

Breaking Grain-128 with Dynamic Cube Attacks Itai Dinur and Adi Shamir Computer Science department The Weizmann Institute Rehovot 76100, Israel

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-03-20 11:59:02
918Tom Berson / Workshop on Cryptographic Hardware and Embedded Systems / International Cryptology Conference / Asiacrypt / PKC / Theory of Cryptography Conference / Journal of Cryptology / Bart Preneel / Cryptography / International Association for Cryptologic Research / Eurocrypt

Microsoft PowerPoint - IACR_Membership_Meeting_EC2013_publicv1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2013-08-16 17:55:40
919Block cipher modes of operation / Block cipher / Ciphertext / RSA / PKCS / Triple DES / Tiny Encryption Algorithm / Cryptography / Public-key cryptography / Padding

Strengthened Encryption in the CBC Mode Vlastimil Klíma 1 and Tomáš Rosa 1,2 1 ICZ, V Olšinách 75, Prague 10, Czech Republic, http://www.i.cz Department of Computer Science and Engineering, Faculty of Electri

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-08-28 08:36:04
920Block cipher modes of operation / RSA / PKCS / Ciphertext / Basic Encoding Rules / Block cipher / Authenticated encryption / Stream ciphers / Ciphertext stealing / Cryptography / Public-key cryptography / Padding

Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format Vlastimil Klíma 1 and Tomáš Rosa 1,2 {vlastimil.klima, tomas.rosa}@i.cz 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-05-12 08:40:12
UPDATE