www.infsec.ethz.ch May 2017
05/02/2017
Write and Alice and Bob protocol, and get it translated into a Tamarin's input
LMS vs XMSS: A comparison of the Stateful Hash-Based Signature Proposed Standards
eprint.iacr.org April 2017
ElsieFour: A Low-Tech Authenticated Encryption Algorithm For Human-to-Human Communication
eprint.iacr.org April 2017
Auditing code for crypto flaws: the first 30 minutes
research.kudelskisecurity.com April 2017
Content Delivery over TLS: A Cryptographic Analysis of Keyless SSL
epubs.surrey.ac.uk April 2017
Post-quantum cryptography---dealing with the fallout of physics success
eprint.iacr.org April 2017
Quantum preimage, 2 nd -preimage, and collision resistance of SHA3
eprint.iacr.org April 2017