1![New Generic Attacks Against Hash-based MACs Ga¨etan Leurent1 , Thomas Peyrin2 , and Lei Wang2 1 Universit´e Catholique de Louvain, Belgium New Generic Attacks Against Hash-based MACs Ga¨etan Leurent1 , Thomas Peyrin2 , and Lei Wang2 1 Universit´e Catholique de Louvain, Belgium](https://www.pdfsearch.io/img/b4184348d12158ac2ad820cb7ccc1179.jpg) | Add to Reading ListSource URL: who.rocq.inria.frLanguage: English - Date: 2018-06-14 07:12:35
|
---|
2![Hash-based signatures Joost Rijneveld Radboud University, Nijmegen, The Netherlands Post-quantum cryptography Hash-based signatures Joost Rijneveld Radboud University, Nijmegen, The Netherlands Post-quantum cryptography](https://www.pdfsearch.io/img/388481bc8b99f1e553b50c2ecb85de90.jpg) | Add to Reading ListSource URL: joostrijneveld.nlLanguage: English - Date: 2018-06-21 04:41:26
|
---|
3![Hash-Based Signatures Stefan-Lukas Gazdag <Stefan-Lukas > 5th ENISA/FORTH Summer School, 27th of September 2018 Hash-Based Signatures Stefan-Lukas Gazdag <Stefan-Lukas > 5th ENISA/FORTH Summer School, 27th of September 2018](https://www.pdfsearch.io/img/eaa3b6a551c062a731edb5b34bc73ef2.jpg) | Add to Reading ListSource URL: nis-summer-school.enisa.europa.euLanguage: English - Date: 2018-10-08 04:24:21
|
---|
4![Comments Received in Response to: Request for Comments on Draft Revision of the Applicability Clause of FIPS 180-4, Secure Hash Standard Comments Received in Response to: Request for Comments on Draft Revision of the Applicability Clause of FIPS 180-4, Secure Hash Standard](https://www.pdfsearch.io/img/8fb6743f1296768a84104d953183e224.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2017-02-27 12:19:53
|
---|
5![Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1 Netherlands National Communication Security Agency (NLNCSA) Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1 Netherlands National Communication Security Agency (NLNCSA)](https://www.pdfsearch.io/img/a4832186a4d4f638a6001f108ff120e3.jpg) | Add to Reading ListSource URL: cryptojedi.orgLanguage: English - Date: 2018-10-07 06:08:08
|
---|
6![Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1 Netherlands National Communication Security Agency (NLNCSA) Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1 Netherlands National Communication Security Agency (NLNCSA)](https://www.pdfsearch.io/img/606e1864b307590d2a46ada6ceab3cc8.jpg) | Add to Reading ListSource URL: joostrijneveld.nlLanguage: English - Date: 2018-09-03 08:56:26
|
---|
7![Differential Power Analysis and Fault Attacks on Hash-Based Signature Schemes Matthias J. Kannwischer 27 March 2018 Radboud University, Nijmegen, The Netherlands Differential Power Analysis and Fault Attacks on Hash-Based Signature Schemes Matthias J. Kannwischer 27 March 2018 Radboud University, Nijmegen, The Netherlands](https://www.pdfsearch.io/img/389df3d25a8cacd8e0190e903df223f8.jpg) | Add to Reading ListSource URL: kannwischer.euLanguage: English - Date: 2018-03-26 10:26:09
|
---|
8![Physical Attack Vulnerability of Hash-Based Signature Schemes Verwundbarkeit von Hash-basierten Signaturverfahren durch Physikalische Angriffe Master-Thesis von Matthias Julius Kannwischer Tag der Einreichung: Physical Attack Vulnerability of Hash-Based Signature Schemes Verwundbarkeit von Hash-basierten Signaturverfahren durch Physikalische Angriffe Master-Thesis von Matthias Julius Kannwischer Tag der Einreichung:](https://www.pdfsearch.io/img/c26107312da841ed8f65e7303c6f3098.jpg) | Add to Reading ListSource URL: kannwischer.euLanguage: English - Date: 2018-06-25 08:42:52
|
---|
9![Cost analysis of hash collisions: will quantum computers make SHARCS obsolete? D. J. Bernstein University of Illinois at Chicago NSF ITR– Cost analysis of hash collisions: will quantum computers make SHARCS obsolete? D. J. Bernstein University of Illinois at Chicago NSF ITR–](https://www.pdfsearch.io/img/20aa953cfe9e8009ac705ea35c4f5832.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2009-09-22 19:00:54
|
---|
10![Time-memory Trade-offs for Near-collisions Ga¨etan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find nearcollisions for a hash function. If we consider o Time-memory Trade-offs for Near-collisions Ga¨etan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find nearcollisions for a hash function. If we consider o](https://www.pdfsearch.io/img/9e81e7aa32b4aba5fd23c25f121194b7.jpg) | Add to Reading ListSource URL: who.rocq.inria.frLanguage: English - Date: 2018-06-14 07:12:40
|
---|