Статьи

НазваниеОписание
A Logic of Authentication.SRC-039 - Burrows, Abadi, Needhm
A Survey of Modern Integer Factorization Algorithms
A mathematical theory of communication - Shannon (1948)
A quick glance at quantum cryptography - Lomonaco
An attack on the Needham-Schroeder Public-Key Authentication Protocol - Gavin Lowe 1995
Analyzing the Needham-Schroeder Public Key Protocol
Blinded Fault Resistant Exponentiation
Completeness of Formal Hashes in the Standard Model
GVG ?RP A Net-centric Negligibility-based Security Model for Self-organizing Networks
Implementing Cryptographic Pairings on Smartcards
Integer Factorization Algorithms
Limitations of Logical Analysis of Cryptographic Protocols
Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers
PUBLIC-KEY CRYPTOSYSTEM BASED ON ISOGENIES
Protocol Vulnerability Analysis (draft)
Quantum information theory and applications to quantum cryptography - Papadakos
Rational Secret Sharing, Revisited
Side-Channel Resistant Ciphers - Model, Analysis and Design
Trace Driven Cache Attack on AES
Большие подстановки для программных шифров - Ростовцев А.Г.
По всем вопросам обращайтесь через форму обратной связи | Статьи партнёров