Marc Stevens

Results: 50



#Item
11

Efficient Doubling on Genus Two Curves over Binary Fields Tanja Lange1, and Marc Stevens2, 1 Institute for Information Security and Cryptology (ITSC), Ruhr-Universit¨

Add to Reading List

Source URL: marc-stevens.nl

- Date: 2017-08-13 07:48:58
    12

    Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1 TU Eindhoven, Faculty of Mathematics and Computer Science

    Add to Reading List

    Source URL: marc-stevens.nl

    - Date: 2017-08-13 07:48:58
      13

      Refined Probability of Differential Characteristics

      Add to Reading List

      Source URL: marc-stevens.nl

      - Date: 2017-08-13 07:48:58
        14

        Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands January 29, 2012

        Add to Reading List

        Source URL: marc-stevens.nl

        - Date: 2017-08-13 07:48:58
          15

          Reverse-engineering of the cryptanalytic attack used in the Flame super-malware ? Max Fillinger and Marc Stevens CWI, Amsterdam, The Netherlands

          Add to Reading List

          Source URL: marc-stevens.nl

          - Date: 2017-08-13 07:48:58
            16

            The first collision for full SHA-1 Marc Stevens1 , Elie Bursztein2 , Pierre Karpman1 , Ange Albertini2 , Yarik Markov2 1 CWI Amsterdam Google Research

            Add to Reading List

            Source URL: marc-stevens.nl

            - Date: 2017-08-13 07:48:58
              17

              Practical Free-Start Collision Attacks on 76-step SHA-1 Pierre Karpman1,2? , Thomas Peyrin2?? , and Marc Stevens3 1 Inria, France

              Add to Reading List

              Source URL: marc-stevens.nl

              - Date: 2017-08-13 07:48:58
                18

                Stellingen bij het proefschrift Attacks on Hash Functions and Applications door Marc Stevens

                Add to Reading List

                Source URL: marc-stevens.nl

                - Date: 2017-08-13 07:48:58
                  19

                  Int. J. of Applied Cryptography, Vol. 2, No. 4, Chosen-prefix collisions for MD5 and applications Marc Stevens

                  Add to Reading List

                  Source URL: marc-stevens.nl

                  - Date: 2017-08-13 07:48:58
                    20

                    Real-Time Visibility-Based Fusion of Depth Maps Paul Merrell1 , Amir Akbarzadeh2 , Liang Wang2 , Philippos Mordohai1 , Jan-Michael Frahm1 , Ruigang Yang2 , David Nist´er2 , and Marc Pollefeys1 1 2 Department of Computer

                    Add to Reading List

                    Source URL: www.cs.stevens.edu

                    - Date: 2007-08-23 17:43:34
                      UPDATE