ECRYPT Logo
Network of Excellence in Cryptology
IST-2002-507932







IST Logo

GENERAL
ECRYPT Position Paper: Recent Collision Attacks on Hash Functions
revision 1.1, 17 February 2005
ECRYPT Yearly Report on Algorithms and Key Lengths (2004)
revision 1.1, 17 March 2005
ECRYPT Yearly Report on Algorithms and Key Lengths (2005)
revision 1.0, 26 January 2006
ECRYPT Challenges for Cryptology Research in Europe for 2007-2013 and beyond (2006)
revision 1.0, 26 May 2006
ECRYPT Yearly Report on Algorithms and Key Lengths (2006)
revision 1.1, 29 January 2007
ECRYPT Final Report on Algorithms and Key Lengths (2008)
revision 1.1, August 2008

STVL deliverables
Stream Cipher Proposals for Ongoing Analysis (D.STVL.1)
revision 1.0, 16 February 2006
AES Security Report (D.STVL.2)
revision 1.0, 30 January 2006
Open Research Areas in Symmetric Cryptography and Technical Trends in Lightweight Cryptography (D.STVL.3)
revision 2.5, 31 January 2005
Ongoing Research Areas in Symmetric Cryptography (D.STVL.5)
revision 1.1, 13 March 2007
Ongoing Research Areas in Symmetric Cryptography (D.STVL.7)
31 August 2008
Ongoing Research Areas in Symmetric Cryptography (D.STVL.9)
31 August 2008

AZTEC deliverables
Lightweight Asymmetric Cryptography and Alternatives to RSA (D.AZTEC.2)
revision 1.2, 17 August 2005
Update to Provable Security: Designs and Open Questions (D.AZTEC.5)
revision 1.0, 31 January 2007
Hardness of the Main Computational Problems Used in Cryptography (D.AZTEC.6)
revision 1.0, 14 March 2007
New Technical Trends in Asymmetric Cryptography (D.AZTEC.7)
revision 1.2, 13 February 2007

PROVILAB deliverables
First Summary Report on Two-Party Protocols (D.PROVI.1)
revision 1.0, 31 January 2005
First Summary Report on Multiparty Protocols (D.PROVI.2)
revision 1.0, 31 January 2005
First Summary Report on Unconditionally Secure Protocols (D.PROVI.3)
revision 1.0, 21 February 2005
Second Summary Report on Two-Party Protocols (D.PROVI.4)
revision 1.1, February 2006
Second Summary Report on Multiparty Protocols (D.PROVI.5)
revision 1.0, 6 March 2006
Second Summary Report on Unconditionally Secure Protocols (D.PROVI.6)
revision 1.1, February 2006
Summary Report on Rational Cryptographic Protocols (D.PROVI.7)
revision 1.0, 2 March 2007
Final Summary Report on Models and Defenitions (D.PROVI.8)
revision 1.0, August 2008
Summary Report on Secure Computation Protocols (D.PROVI.9)
revision 1.0, August 2008

VAMPIRE deliverables
Performance Benchmarks (D.VAM.1)
revision 1.1, 3 August 2005
State of the Art in Hardware Architectures (D.VAM.2)
revision 1.0, 5 September 2005
Hardware Crackers (D.VAM.3)
revision 1.0, 25 August 2005
Electromagnetic Analysis and Fault Attacks: State of the Art (D.VAM.4)
revision 3, 25 May 2005
Report on DPA and EMA attacks on FPGAs (D.VAM.5)
revision 1, 31 July 2005
Open Problems in Implementation and Application (D.VAM.6)
revision 1.4, 13 March 2006
Performance Benchmarks - Public Key Cryptography I (D.VAM.7)
revision 1.0, 28 February 2006
Report on "eBATS Performance Benchmarks" (D.VAM.9)
revision 1.1, 1 March 2007
State of the art hardware architectures for cryptographic algorithms (D.VAM.10)
revision 1.0, 8 March 2006
Suggested Algorithms for Light-Weight Cryptography (D.VAM.11)
revision 1.0, 15 September 2006
eBATS-Benchmarking of Asymmetric Systems (D.VAM.13)
revision 1.0, 24 February 2007
Performing Benchmarks on both stages (D.VAM.14)
revision 1.0, August 2008
Theoretical Models on Side-Channel Attacks (D.VAM.15)
revision 1.1, August 2008

WAVILA deliverables
First Summary Report on Fundamentals (D.WVL.1)
revision 2.0, 18 March 2005
Research Report on Watermarking Fundamentals (D.WVL.2)
revision 1.0, 30 June 2005
First Summary Report on Practical Systems (D.WVL.3)
revision 2.21, 31 January 2005
First Summary Report on Asymmetrical Watermarking (D.WVL.4)
revision 1.0, 31 January 2005
First Summary Report on Hybrid Systems (D.WVL.5)
revision 1.0, 31 January 2005
First Summary Report on Authentication (D.WVL.6)
revision 2.0, 27 January 2005
First Summary Report on Forensic Tracking (D.WVL.7)
revision 1.0, 25 February 2005
Second Summary Report on Fundamental Aspects of Watermarking Schemes (D.WVL.8)
revision 1.0, 30 January 2006
Report on the Security of Practical Systems (D.WVL.9)
revision 2.0, 31 July 2006
Audio Benchmarking Tools and Steganalysis (D.WVL.10)
revision 1.1, 22 February 2006
Benchmarking Metrics and Concepts for Perceptual Hashing (D.WVL.11)
revision 1.0, 19 October 2006
Applications, Application Requirements, and Metrics for Perceptual Hashing (D.WVL.12)
revision 1.0, 24 February 2006
Progress of Forensic Tracking Techniques (D.WVL.13)
revision 1.0, 19 October 2006
Third Summary Report on Fundamental Aspects of Watermarking Schemes (D.WVL.14)
revision 1.0, 27 January 2007
Second Report on the Security of Practical Systems (D.WVL.15)
revision 1.0, August 2008
Watermarking Benchmarking (D.WVL.16)
revision 1.0, August 2008
Third summary report on Fundamentals (D.WVL.18)
revision 1.0, August 2008
Final report on Fundamentals (D.WVL.19)
revision 1.0, August 2008
Final Report on the Security of Practical Systems (D.WVL.20)
revision 1.0, August 2008
Final Report on Watermarking Benchmarking (D.WVL.21)
revision 1.0, August 2008
Final Report on Forensic Tracking Techniques (D.WVL.22)
revision 1.0, August 2008