Poly1305

Results: 10



#Item
1EdDSA signatures and Ed25519 Peter Schwabe Joint work with Daniel J. Bernstein, Niels Duif, Tanja Lange, and Bo-Yin Yang March 20, 2012

EdDSA signatures and Ed25519 Peter Schwabe Joint work with Daniel J. Bernstein, Niels Duif, Tanja Lange, and Bo-Yin Yang March 20, 2012

Add to Reading List

Source URL: caramba.loria.fr

Language: English - Date: 2016-06-13 15:37:33
2ChaCha20 and Poly1305 Cipher Suites for TLS Adam Langley Wan-Teh Chang  Outline

ChaCha20 and Poly1305 Cipher Suites for TLS Adam Langley Wan-Teh Chang Outline

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2013-11-05 13:13:43
3Security analysis and fault injection experiment on AES Olivier Faurax1,2 , Traian Muntean2 1 Ecole ´

Security analysis and fault injection experiment on AES Olivier Faurax1,2 , Traian Muntean2 1 Ecole ´

Add to Reading List

Source URL: ofaurax.free.fr

Language: English - Date: 2008-03-30 13:20:25
4An extended abstract of this paper appears in Selected Areas in Cryptography - SAC 2014, Lecture Notes in Computer Science, A. Joux and A. Youssef, Springer-Verlag, 2014. This is the full version. Chaskey: An Efficient M

An extended abstract of this paper appears in Selected Areas in Cryptography - SAC 2014, Lecture Notes in Computer Science, A. Joux and A. Youssef, Springer-Verlag, 2014. This is the full version. Chaskey: An Efficient M

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-11 11:03:47
5Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Add to Reading List

Source URL: www.mjos.fi

Language: English - Date: 2013-01-05 09:33:40
62006 Paper 4 Question 10  Introduction to Security (a) Alice and Bob participate in a public-key infrastructure that enables them to exchange legally binding digital signatures. (i ) Name two reasons why, for some purpos

2006 Paper 4 Question 10 Introduction to Security (a) Alice and Bob participate in a public-key infrastructure that enables them to exchange legally binding digital signatures. (i ) Name two reasons why, for some purpos

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:43
7LNCS[removed]Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)

LNCS[removed]Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)

Add to Reading List

Source URL: www2.cs.uni-paderborn.de

Language: English - Date: 2004-07-08 11:01:15
8

PDF Document

Add to Reading List

Source URL: cr.yp.to

Language: English - Date: 2005-01-07 17:27:39
9

PDF Document

Add to Reading List

Source URL: cr.yp.to

Language: English - Date: 2005-04-27 04:51:22
10Untitled

Untitled

Add to Reading List

Source URL: airccse.org

Language: English - Date: 2012-08-23 05:37:56