Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Viguier, B.G.P."'
Autor:
Viguier, B.G.P.
Contains fulltext : 241047.pdf (Publisher’s version ) (Open Access) In this thesis we cover a large part of the classical cryptography world: we examine the design of new symmetric primitive; we explore implementation strategies of lightweight sche
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::4314e6daec9666769c3f6f7f24464427
http://hdl.handle.net/2066/241047
http://hdl.handle.net/2066/241047
Autor:
Campos, F., Jellema, L., Lemmen, M., Müller, L., Sprenkels, D., Viguier, B.G.P., Krenn, S., Shulman, H., Vaudenay, S.
Publikováno v:
Krenn, S.; Shulman, H.; Vaudenay, S. (ed.), Cryptology and Network Security: 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings, pp. 526-545
Krenn, S.; Shulman, H.; Vaudenay, S. (ed.), Cryptology and Network Security: 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings, 526-545. Cham : Springer
STARTPAGE=526;ENDPAGE=545;ISSN=0302-9743;TITLE=Krenn, S.; Shulman, H.; Vaudenay, S. (ed.), Cryptology and Network Security: 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings
Krenn, S.; Shulman, H.; Vaudenay, S. (ed.), Cryptology and Network Security: 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings, 526-545. Cham : Springer
STARTPAGE=526;ENDPAGE=545;ISSN=0302-9743;TITLE=Krenn, S.; Shulman, H.; Vaudenay, S. (ed.), Cryptology and Network Security: 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings
Contains fulltext : 230072.pdf (Publisher’s version ) (Closed access) CANS 2020
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::a714bd0030cdf84814c71e928020ecbc
https://hdl.handle.net/2066/230072
https://hdl.handle.net/2066/230072
Autor:
Bertoni, G., Daemen, J., Peeters, M., Assche, G. Van, Keer, R. Van, Viguier, B.G.P., Preneel, B.
Publikováno v:
Preneel, B. (ed.), Applied Cryptography and Network Security: 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings, 400-418. Cham : Springer International Publishing
STARTPAGE=400;ENDPAGE=418;ISSN=0302-9743;TITLE=Preneel, B. (ed.), Applied Cryptography and Network Security: 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings
Preneel, B. (ed.), Applied Cryptography and Network Security: 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings, pp. 400-418
STARTPAGE=400;ENDPAGE=418;ISSN=0302-9743;TITLE=Preneel, B. (ed.), Applied Cryptography and Network Security: 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings
Preneel, B. (ed.), Applied Cryptography and Network Security: 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings, pp. 400-418
Contains fulltext : 195384.pdf (Publisher’s version ) (Open Access) We present KangarooTwelve, a fast and secure arbitrary output-length hash function aiming at a higher speed than the FIPS 202’s SHA-3 and SHAKE functions. While sharing many feat
Autor:
Ashur, T., Eichlseder, M., Lauridsen, M.M., Leurent, G., Minaud, B., Rotella, Yann, Sasaki, Yu, Viguier, B.G.P., Peyrin, T., Galbraith, S.D.
Publikováno v:
Peyrin, T.; Galbraith, S.D. (ed.), Advances in Cryptology-ASIACRYPT 2018-24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II, pp. 35-64
ASIACRYPT 2018-24th Annual International Conference on the Theory and Application of Cryptology and Information Security
ASIACRYPT 2018-24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2018, Brisbane, Australia. pp.35-64, ⟨10.1007/978-3-030-03329-3_2⟩
Peyrin, T.; Galbraith, S.D. (ed.), Advances in Cryptology-ASIACRYPT 2018-24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II, 35-64. Cham : Springer
STARTPAGE=35;ENDPAGE=64;ISSN=0302-9743;TITLE=Peyrin, T.; Galbraith, S.D. (ed.), Advances in Cryptology-ASIACRYPT 2018-24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II
Lecture Notes in Computer Science ISBN: 9783030033286
ASIACRYPT (2)
ASIACRYPT 2018-24th Annual International Conference on the Theory and Application of Cryptology and Information Security
ASIACRYPT 2018-24th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2018, Brisbane, Australia. pp.35-64, ⟨10.1007/978-3-030-03329-3_2⟩
Peyrin, T.; Galbraith, S.D. (ed.), Advances in Cryptology-ASIACRYPT 2018-24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II, 35-64. Cham : Springer
STARTPAGE=35;ENDPAGE=64;ISSN=0302-9743;TITLE=Peyrin, T.; Galbraith, S.D. (ed.), Advances in Cryptology-ASIACRYPT 2018-24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II
Lecture Notes in Computer Science ISBN: 9783030033286
ASIACRYPT (2)
MORUS is a high-performance authenticated encryption algorithm submitted to the CAESAR competition, and recently selected as a finalist. There are three versions of MORUS: MORUS-640 with a 128-bit key, and MORUS-1280 with 128-bit or 256-bit keys. For
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::216f8f3cdef388bbed1caef4fb8d544c
https://hdl.handle.net/2066/200769
https://hdl.handle.net/2066/200769