Ga

Results: 22274



#Item
1Cryptography / Message authentication codes / Error detection and correction / Cryptographic hash functions / Hashing / HMAC / Hash function / MD5 / GOST / SHA-1 / Checksum / UMAC

New Generic Attacks Against Hash-based MACs Ga¨etan Leurent1 , Thomas Peyrin2 , and Lei Wang2 1 Universit´e Catholique de Louvain, Belgium

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:35
2Information science / Knowledge representation / Knowledge engineering / Artificial intelligence / Knowledge / Computational linguistics / Natural language processing / Crowdsourcing / Ontology / Semantic Web / Annotation / General Architecture for Text Engineering

Leveraging Crowdsourcing for the Thematic Annotation of the Qur’an Amna Basharat, I. Budak Arpinar, Khaled Rasheed Dept. of Computer Science, University of Georgia, Athens, GA, 30605 USA amnabash,budak,

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:24:27
3Cryptography / Cryptographic hash functions / NIST hash function competition / Flynn's taxonomy / Parallel computing / SIMD / SHA-3 / Hash function / Block cipher / MerkleDamgrd construction / One-way compression function

SHA-3 submission – Tweaked version: SIMD Is a Message Digest Principal submitter: Ga¨etan Leurent

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:39
4Cryptography / Block cipher modes of operation / Message authentication codes / Galois/Counter Mode / Cipher / Cryptographic hash functions / Block cipher / Stream cipher

Key Recovery Attack against 2.5-round π-Cipher Christina Boura1 , Avik Chakraborti2 , Ga¨etan Leurent3 , Goutam Paul2 , Dhiman Saha4 , Hadi Soleimany5,6 and Valentin Suder7 1 6

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:37
5Cryptography / Cryptographic hash functions / SHA-2 / Preimage attack / SHA-1 / MD5 / HMAC / Collision attack / Hash function / Collision resistance / Birthday attack / RIPEMD

The Sum Can Be Weaker Than Each Part? Ga¨etan Leurent1 and Lei Wang2 1 2

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
6Economy / Money / Bitcoin / Finance / Cryptocurrencies / Digital currencies / BitPay / Alternative currencies / Revolut / Tony Gallippi / Economics of bitcoin

BitPay Celebrates its Seventh Year Highlighting Advancements in Cryptocurrency Space Atlanta, Ga, July 30, 2018 – ​BitPay​, the largest global blockchain payments provider, was founded in 2011, while Bitcoin was s

Add to Reading List

Source URL: bitpay.com

Language: English - Date: 2018-10-23 20:13:12
7Order theory / Binary relations / Partially ordered set

arXiv:1810.05256v1 [cs.DC] 11 OctALEPH: A LEADERLESS, ASYNCHRONOUS, BYZANTINE FAULT TOLERANT CONSENSUS PROTOCOL ´ ADAM GA

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2018-10-14 21:12:04
8Cryptography / Block cipher modes of operation / Message authentication codes / Finite fields / Block cipher / CBC-MAC / Keystream / One-key MAC / Block size / Galois/Counter Mode / XXTEA

The Missing Difference Problem, and its Applications to Counter Mode Encryption? Ga¨etan Leurent and Ferdinand Sibleyras Inria, France {gaetan.leurent,ferdinand.sibleyras}@inria.fr

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:37
9Cryptography / Applied mathematics / Differential cryptanalysis / Data Encryption Standard / Block cipher / Truncated differential cryptanalysis / ICE / Cryptanalysis / Statistical hypothesis testing / Rebound attack / Differential-linear attack

Differential Forgery Attack against LAC Ga¨etan Leurent Inria, France Abstract. LAC is one of the candidates to the CAESAR competition.

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:36
10Mathematics / Multiplication / Multiplication algorithm / Advanced Encryption Standard / Polynomial / Abstract algebra / Polynomials / Error detection and correction / Finite fields

Hardware Implementation and Side-Channel Analysis of Lapin Lubos Gaspar1 , Ga¨etan Leurent1,2 , and Fran¸cois-Xavier Standaert1 1 ICTEAM/ELEN/Crypto Group, Universit´e catholique de Louvain, Belgium.

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:36
UPDATE