![]() Music |
![]() Video |
![]() Movies |
![]() Chart |
![]() Show |
![]() |
Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3 (RSA Conference) View |
![]() |
Applied Cryptology 5.2: Differential Cryptanalysis (Cihangir Tezcan) View |
![]() |
Cryptanalysis 8.1: Results of Experimentally Verifying a Differential Distinguisher (Cihangir Tezcan) View |
![]() |
Aead (Aead Eso) View |
![]() |
Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96 (IACR) View |
![]() |
Construction of Differential Characteristics in ARX Desi ... (IACR) View |
![]() |
Introduction. Differential uniformity - Cryptography: Boolean functions and related problems (Doan Thien Khanh) View |
![]() |
Shorter Hash-and-Sign Lattice-Based Signatures (IACR) View |
![]() |
FSE 2018 - Human-readable Proof of the Related-Key Security of AES 128 (COSIC - Computer Security and Industrial Cryptography) View |
![]() |
COSIC seminar (COSIC - Computer Security and Industrial Cryptography) View |