Marc Stevens

Results: 50



#Item
11Efficient Doubling on Genus Two Curves over Binary Fields Tanja Lange1, and Marc Stevens2, 1 Institute for Information Security and Cryptology (ITSC), Ruhr-Universit¨

Efficient Doubling on Genus Two Curves over Binary Fields Tanja Lange1, and Marc Stevens2, 1 Institute for Information Security and Cryptology (ITSC), Ruhr-Universit¨

Add to Reading List

Source URL: marc-stevens.nl

- Date: 2017-08-13 07:48:58
    12Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1  TU Eindhoven, Faculty of Mathematics and Computer Science

    Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1 TU Eindhoven, Faculty of Mathematics and Computer Science

    Add to Reading List

    Source URL: marc-stevens.nl

    - Date: 2017-08-13 07:48:58
      13Refined Probability of Differential Characteristics

      Refined Probability of Differential Characteristics

      Add to Reading List

      Source URL: marc-stevens.nl

      - Date: 2017-08-13 07:48:58
        14Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands  January 29, 2012

        Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands January 29, 2012

        Add to Reading List

        Source URL: marc-stevens.nl

        - Date: 2017-08-13 07:48:58
          15Reverse-engineering of the cryptanalytic attack used in the Flame super-malware ? Max Fillinger and Marc Stevens CWI, Amsterdam, The Netherlands

          Reverse-engineering of the cryptanalytic attack used in the Flame super-malware ? Max Fillinger and Marc Stevens CWI, Amsterdam, The Netherlands

          Add to Reading List

          Source URL: marc-stevens.nl

          - Date: 2017-08-13 07:48:58
            16The first collision for full SHA-1 Marc Stevens1 , Elie Bursztein2 , Pierre Karpman1 , Ange Albertini2 , Yarik Markov2 1 CWI Amsterdam Google Research

            The first collision for full SHA-1 Marc Stevens1 , Elie Bursztein2 , Pierre Karpman1 , Ange Albertini2 , Yarik Markov2 1 CWI Amsterdam Google Research

            Add to Reading List

            Source URL: marc-stevens.nl

            - Date: 2017-08-13 07:48:58
              17Practical Free-Start Collision Attacks on 76-step SHA-1 Pierre Karpman1,2? , Thomas Peyrin2?? , and Marc Stevens3 1  Inria, France

              Practical Free-Start Collision Attacks on 76-step SHA-1 Pierre Karpman1,2? , Thomas Peyrin2?? , and Marc Stevens3 1 Inria, France

              Add to Reading List

              Source URL: marc-stevens.nl

              - Date: 2017-08-13 07:48:58
                18Stellingen bij het proefschrift Attacks on Hash Functions and Applications door Marc Stevens

                Stellingen bij het proefschrift Attacks on Hash Functions and Applications door Marc Stevens

                Add to Reading List

                Source URL: marc-stevens.nl

                - Date: 2017-08-13 07:48:58
                  19Int. J. of Applied Cryptography, Vol. 2, No. 4, Chosen-prefix collisions for MD5 and applications Marc Stevens

                  Int. J. of Applied Cryptography, Vol. 2, No. 4, Chosen-prefix collisions for MD5 and applications Marc Stevens

                  Add to Reading List

                  Source URL: marc-stevens.nl

                  - Date: 2017-08-13 07:48:58
                    20Real-Time Visibility-Based Fusion of Depth Maps Paul Merrell1 , Amir Akbarzadeh2 , Liang Wang2 , Philippos Mordohai1 , Jan-Michael Frahm1 , Ruigang Yang2 , David Nist´er2 , and Marc Pollefeys1 1 2 Department of Computer

                    Real-Time Visibility-Based Fusion of Depth Maps Paul Merrell1 , Amir Akbarzadeh2 , Liang Wang2 , Philippos Mordohai1 , Jan-Michael Frahm1 , Ruigang Yang2 , David Nist´er2 , and Marc Pollefeys1 1 2 Department of Computer

                    Add to Reading List

                    Source URL: www.cs.stevens.edu

                    - Date: 2007-08-23 17:43:34