all InfoSec news
Topic: ciphers
Crooked indifferentiability of the Feistel Construction
2 days, 16 hours ago |
arxiv.org
On the Direct Construction of MDS and Near-MDS Matrices
1 week, 2 days ago |
arxiv.org
HyCaMi: High-Level Synthesis for Cache Side-Channel Mitigation
1 week, 5 days ago |
www.iacr.org
Solving Degree Bounds For Iterated Polynomial Systems
1 month, 1 week ago |
arxiv.org
Partial Differential Fault Analysis on Ascon
1 month, 3 weeks ago |
www.iacr.org
Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate
1 month, 3 weeks ago |
www.iacr.org
Lightweight ciphers based on chaotic Map -- LFSR architectures
1 month, 4 weeks ago |
arxiv.org
Theoretical differential fault attacks on FLIP and FiLIP
2 months, 3 weeks ago |
www.iacr.org
Layout Graphs, Random Walks and the t-wise Independence of SPN Block Ciphers
2 months, 4 weeks ago |
www.iacr.org
Cycle Structure and Observability of Two Types of Galois NFSRs
4 months, 2 weeks ago |
www.iacr.org
BBB PRP Security of the Lai-Massey Mode
4 months, 2 weeks ago |
www.iacr.org
Cryptanalysis of QARMAv2
4 months, 2 weeks ago |
www.iacr.org
Design of a Linear Layer Optimised for Bitsliced 32-bit Implementation
4 months, 3 weeks ago |
www.iacr.org
Designing Full-Rate Sponge based AEAD modes
5 months, 2 weeks ago |
www.iacr.org
Unleashing the Power of Differential Fault Attacks on QARMAv2
5 months, 2 weeks ago |
www.iacr.org
TLS Cipher Suites: Which Ones to Let Go in 2023?
5 months, 3 weeks ago |
hackernoon.com
Threshold Implementations with Non-Uniform Inputs
6 months, 1 week ago |
www.iacr.org
Improving the Rectangle Attack on GIFT-64
6 months, 3 weeks ago |
www.iacr.org
Tight Security Bound of 2k-LightMAC Plus
6 months, 3 weeks ago |
www.iacr.org
Cryptanalysis of HALFLOOP Block Ciphers: Destroying HALFLOOP-24
7 months, 2 weeks ago |
www.iacr.org
Algebraic Cryptanalysis of Full Ciminion
7 months, 3 weeks ago |
www.iacr.org
Cascading Four Round LRW1 is Beyond Birthday Bound Secure
7 months, 4 weeks ago |
www.iacr.org
Extension of Shannon's theory of ciphers based on Latin rectangles
8 months, 1 week ago |
www.iacr.org
Cisco Switch Flaw Let Attack Reads Encrypted Traffic
9 months, 1 week ago |
gbhackers.com
Items published with this topic over the last 90 days.
Latest
Crooked indifferentiability of the Feistel Construction
2 days, 16 hours ago |
arxiv.org
On the Direct Construction of MDS and Near-MDS Matrices
1 week, 2 days ago |
arxiv.org
HyCaMi: High-Level Synthesis for Cache Side-Channel Mitigation
1 week, 5 days ago |
www.iacr.org
Solving Degree Bounds For Iterated Polynomial Systems
1 month, 1 week ago |
arxiv.org
Partial Differential Fault Analysis on Ascon
1 month, 3 weeks ago |
www.iacr.org
Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate
1 month, 3 weeks ago |
www.iacr.org
Lightweight ciphers based on chaotic Map -- LFSR architectures
1 month, 4 weeks ago |
arxiv.org
Theoretical differential fault attacks on FLIP and FiLIP
2 months, 3 weeks ago |
www.iacr.org
Layout Graphs, Random Walks and the t-wise Independence of SPN Block Ciphers
2 months, 4 weeks ago |
www.iacr.org
Cycle Structure and Observability of Two Types of Galois NFSRs
4 months, 2 weeks ago |
www.iacr.org
BBB PRP Security of the Lai-Massey Mode
4 months, 2 weeks ago |
www.iacr.org
Cryptanalysis of QARMAv2
4 months, 2 weeks ago |
www.iacr.org
Design of a Linear Layer Optimised for Bitsliced 32-bit Implementation
4 months, 3 weeks ago |
www.iacr.org
Designing Full-Rate Sponge based AEAD modes
5 months, 2 weeks ago |
www.iacr.org
Unleashing the Power of Differential Fault Attacks on QARMAv2
5 months, 2 weeks ago |
www.iacr.org
TLS Cipher Suites: Which Ones to Let Go in 2023?
5 months, 3 weeks ago |
hackernoon.com
Threshold Implementations with Non-Uniform Inputs
6 months, 1 week ago |
www.iacr.org
Improving the Rectangle Attack on GIFT-64
6 months, 3 weeks ago |
www.iacr.org
Tight Security Bound of 2k-LightMAC Plus
6 months, 3 weeks ago |
www.iacr.org
Cryptanalysis of HALFLOOP Block Ciphers: Destroying HALFLOOP-24
7 months, 2 weeks ago |
www.iacr.org
Algebraic Cryptanalysis of Full Ciminion
7 months, 3 weeks ago |
www.iacr.org
Cascading Four Round LRW1 is Beyond Birthday Bound Secure
7 months, 4 weeks ago |
www.iacr.org
Extension of Shannon's theory of ciphers based on Latin rectangles
8 months, 1 week ago |
www.iacr.org
Cisco Switch Flaw Let Attack Reads Encrypted Traffic
9 months, 1 week ago |
gbhackers.com
Topic trend (last 90 days)
Top (last 7 days)
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Transfer GMP Compliance Officer
@ Pharmathen | Sapes, East Macedonia and Thrace, Greece
Security Cyber Consultant DRC (m/w/d)
@ Atos | Berlin, DE, D-13353
Penetration Tester - InfoSec
@ Rapid7 | NIS Belfast
Cyber Vulnerability Lead
@ Under Armour | Remote, US