<--- Back to Details
First PageDocument Content
Cryptography / Internet Standards / Message authentication codes / Elliptic curve cryptography / Stream ciphers / Advanced Encryption Standard / Poly1305 / NaCl / Salsa20 / Curve25519 / Elliptic-curve DiffieHellman / Galois/Counter Mode
Date: 2015-09-14 03:43:23
Cryptography
Internet Standards
Message authentication codes
Elliptic curve cryptography
Stream ciphers
Advanced Encryption Standard
Poly1305
NaCl
Salsa20
Curve25519
Elliptic-curve DiffieHellman
Galois/Counter Mode

NaCl’s crypto_box in hardware Michael Hutter1, , Jürgen Schilling2 , Peter Schwabe3 , and Wolfgang Wieser2 ? 1

Add to Reading List

Source URL: cryptojedi.org

Download Document from Source Website

File Size: 542,65 KB

Share Document on Facebook

Similar Documents

EdDSA signatures and Ed25519 Peter Schwabe Joint work with Daniel J. Bernstein, Niels Duif, Tanja Lange, and Bo-Yin Yang March 20, 2012

EdDSA signatures and Ed25519 Peter Schwabe Joint work with Daniel J. Bernstein, Niels Duif, Tanja Lange, and Bo-Yin Yang March 20, 2012

DocID: 1niQQ - View Document

ChaCha20 and Poly1305 Cipher Suites for TLS Adam Langley Wan-Teh Chang  Outline

ChaCha20 and Poly1305 Cipher Suites for TLS Adam Langley Wan-Teh Chang Outline

DocID: 1kR8U - View Document

Security analysis and fault injection experiment on AES Olivier Faurax1,2 , Traian Muntean2 1 Ecole ´

Security analysis and fault injection experiment on AES Olivier Faurax1,2 , Traian Muntean2 1 Ecole ´

DocID: 18qtC - View Document

An extended abstract of this paper appears in Selected Areas in Cryptography - SAC 2014, Lecture Notes in Computer Science, A. Joux and A. Youssef, Springer-Verlag, 2014. This is the full version. Chaskey: An Efficient M

An extended abstract of this paper appears in Selected Areas in Cryptography - SAC 2014, Lecture Notes in Computer Science, A. Joux and A. Youssef, Springer-Verlag, 2014. This is the full version. Chaskey: An Efficient M

DocID: OG5h - View Document

Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes Markku-Juhani O. Saarinen R EVERE S ECURITY 4500 Westgrove Drive, Suite 335, Addison, TX 75001, USA. [removed]

DocID: ewvM - View Document