Who

Results: 137297



#Item
11New Generic Attacks Against Hash-based MACs Ga¨etan Leurent1 , Thomas Peyrin2 , and Lei Wang2 1 Universit´e Catholique de Louvain, Belgium

New Generic Attacks Against Hash-based MACs Ga¨etan Leurent1 , Thomas Peyrin2 , and Lei Wang2 1 Universit´e Catholique de Louvain, Belgium

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:35
12Cryptanalysis of Feistel Networks with Secret Round Functions ? Alex Biryukov1 , Gaëtan Leurent2 , and Léo Perrin3 1  3

Cryptanalysis of Feistel Networks with Secret Round Functions ? Alex Biryukov1 , Gaëtan Leurent2 , and Léo Perrin3 1 3

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:34
131. Of the Nature of Flatland. I call our world Flatland, not because we call it so, but to make its nature clearer to you, my happy readers, who are privileged to live in Space. Imagine a vast sheet of paper on which str

1. Of the Nature of Flatland. I call our world Flatland, not because we call it so, but to make its nature clearer to you, my happy readers, who are privileged to live in Space. Imagine a vast sheet of paper on which str

Add to Reading List

Source URL: thelocalyarn.com

Language: English - Date: 2016-10-05 09:28:30
14Emerging Markets Debt – Recognise and capture the positive opportunities Emerging markets are by nature a risky asset class, but investors who take a long-term view will benefit from the higher yields on offer compared

Emerging Markets Debt – Recognise and capture the positive opportunities Emerging markets are by nature a risky asset class, but investors who take a long-term view will benefit from the higher yields on offer compared

Add to Reading List

Source URL: www.fundexpertsforum.com

Language: English - Date: 2018-05-29 09:58:50
15Introduction  State-recovery for HMAC-HAIFA Short message attacks

Introduction State-recovery for HMAC-HAIFA Short message attacks

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:35
16SHA-3 submission – Tweaked version: SIMD Is a Message Digest Principal submitter:  Ga¨etan Leurent

SHA-3 submission – Tweaked version: SIMD Is a Message Digest Principal submitter: Ga¨etan Leurent

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:39
17A Comparison of High-Level Full-System Power Models Who needs power models? !! Component and system designers

A Comparison of High-Level Full-System Power Models Who needs power models? !! Component and system designers "! How do design decisions affect power?

Add to Reading List

Source URL: rivoire.cs.sonoma.edu

Language: English - Date: 2017-05-29 18:44:55
18Generic Attacks against Beyond-Birthday-Bound MACs Gaëtan Leurent1 , Mridul Nandi2 , and Ferdinand Sibleyras1 1  Inria, France

Generic Attacks against Beyond-Birthday-Bound MACs Gaëtan Leurent1 , Mridul Nandi2 , and Ferdinand Sibleyras1 1 Inria, France

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:33
19Our Veterans 		 Our Stories A Newspaper in Education Supplement to  Who are Veterans?

Our Veterans Our Stories A Newspaper in Education Supplement to Who are Veterans?

Add to Reading List

Source URL: www.nieteacher.org

Language: English - Date: 2009-07-16 14:29:08
    20Key Recovery Attack against 2.5-round π-Cipher Christina Boura1 , Avik Chakraborti2 , Ga¨etan Leurent3 , Goutam Paul2 , Dhiman Saha4 , Hadi Soleimany5,6 and Valentin Suder7 1  6

    Key Recovery Attack against 2.5-round π-Cipher Christina Boura1 , Avik Chakraborti2 , Ga¨etan Leurent3 , Goutam Paul2 , Dhiman Saha4 , Hadi Soleimany5,6 and Valentin Suder7 1 6

    Add to Reading List

    Source URL: who.rocq.inria.fr

    Language: English - Date: 2018-06-14 07:12:37