Maria Eichlseder: SIFA Exploiting Ineffective Fault Inductions on Symmetric Cryptography Irancrypt 1:33:08 3 years ago 242 Далее Скачать
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography IACR 20:13 6 years ago 717 Далее Скачать
Maria Eichlseder | Analysis of the Kupyna 256 Hash Function Horst Goertz Institute for IT Security 21:32 8 years ago 245 Далее Скачать
HEROES OF TECH - IAIK Institute | Maria Eichlseder & Sujoy SINHA ROY Silicon Alps 4:32 2 years ago 573 Далее Скачать
InfoSec L4 - Crypto 4 - Protocols & Applications Maria Eichlseder 2:40:42 Streamed 3 years ago 1 855 Далее Скачать
Cryptography - L6 Symmetric Encryption Maria Eichlseder 1:54:27 Streamed 4 years ago 1 017 Далее Скачать
An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography IACR 19:06 6 years ago 298 Далее Скачать
InfoSec L3 - Crypto 3 - Asymmetric Cryptography Maria Eichlseder 2:37:25 Streamed 3 years ago 2 359 Далее Скачать
Applied Crypto 2 - L7 Tools for Cryptanalysis Maria Eichlseder 1:51:26 Streamed 4 years ago 599 Далее Скачать
Cryptography - L7 Factoring-based Asymmetric Cryptography Maria Eichlseder 1:48:25 Streamed 4 years ago 875 Далее Скачать
Side-Channel Attacks: What Part of Microarchitecture is Your Favorite? Side Channel Security 0:45 1 year ago 628 Далее Скачать
Statistical Fault Attacks on Nonce Based Authenticated Encryption Schemes IACR 24:56 7 years ago 672 Далее Скачать
"Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes" (Jan-Pieter D’Anvers) COSIC - Computer Security and Industrial Cryptography 16:48 5 years ago 360 Далее Скачать
Lattice-based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA RSA Conference 34:33 2 years ago 537 Далее Скачать
Symmetric vs. Asymmetric Encryption - CompTIA Security+ SY0-401: 6.1 Professor Messer 4:18 10 years ago 145 108 Далее Скачать