Tillich

Results: 94



#Item
11Science and technology in Germany / Fraunhofer Society / States of Germany / Saxony / Reimund Neugebauer / Dresden University of Technology / Schieferdecker / Stanislaw Tillich / Tillich / Dresden

German Chancellor visited Dresden microelectronics industry III

Add to Reading List

Source URL: www.heimannsensor.com

Language: English - Date: 2015-08-26 06:32:02
12

Preimages for the Tillich-Z´ emor hash function Christophe Petit1? , Jean-Jacques Quisquater1 UCL Crypto Group?? Universit´e catholique de Louvain Place du levant 3

Add to Reading List

Source URL: www.uclouvain.be

Language: English - Date: 2011-12-14 05:30:35
    13

    Efficiency and Pseudo-Randomness of a Variant of Z´emor-Tillich Hash Function (Invited Paper) Christophe Petit Nicolas Veyrat-Charvillon

    Add to Reading List

    Source URL: www.uclouvain.be

    Language: English - Date: 2011-12-14 05:30:34
      14

      Hard and easy Components of Collision Search in the Z´ emor-Tillich Hash Function: new Attacks and Reduced Variants with Equivalent Security Christophe Petit1? , Jean-Jacques Quisquater1 ,

      Add to Reading List

      Source URL: www.uclouvain.be

      Language: English - Date: 2011-12-14 05:30:43
        15

        Decoding Quantum LDPC Codes J.P. Tillich 8 December 2014 Quantum low-density parity-check (LDPC) codes are stabilizer codes in which each stabilizer generator acts on O(1) qubits and each qubit participates in O(1) gener

        Add to Reading List

        Source URL: www.quantum-lab.org

        Language: English - Date: 2014-12-13 01:27:37
          16

          Security Analysis of an Open Car Immobilizer Protocol Stack 4th International Conference on Trusted Systems (InTrustDecember 17-18, Egham, UK Stefan Tillich and Marcin Wójcik

          Add to Reading List

          Source URL: www.intrust2012.com

          Language: English - Date: 2013-01-09 03:57:00
            17

            Hardware Implementations of a Variant of the Z´ emor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ? Giacomo de Meulenaer Christophe Petit and Jean-Jacques Quisquater

            Add to Reading List

            Source URL: www.uclouvain.be

            Language: English - Date: 2011-12-14 05:30:37
              18

              Computing the algebraic immunity efficiently Fr´ ed´ eric Didier, Jean-Pierre Tillich INRIA, projet CODES

              Add to Reading List

              Source URL: fse2006.iaik.tugraz.at

              Language: English - Date: 2013-02-04 08:11:49
                19

                A distinguisher for high-rate McEliece Cryptosystems J.C. Faug`ere (INRIA, SALSA project), A. Otmani (Universit´e Caen- INRIA, SECRET project), L. Perret (INRIA, SALSA project), J.-P. Tillich (INRIA, SECRET project)

                Add to Reading List

                Source URL: pqc2010.cased.de

                Language: English - Date: 2010-05-28 02:04:14
                  20

                  An efficient attack of a McEliece cryptosystem variant based on convolutional codes Gregory Landais Jean-Pierre Tillich

                  Add to Reading List

                  Source URL: pqcrypto2013.xlim.fr

                  Language: English - Date: 2013-06-24 09:56:08
                    UPDATE