|
GENERAL
|
ECRYPT II Yearly Report on Algorithms
and Key Lengths (2009)
revision 1.0, 27 July 2009 |
ECRYPT II Yearly Report on Algorithms
and Key Lengths (2010)
revision 1.0, 30 March 2010 |
ECRYPT II Yearly Report on Algorithms
and Key Lengths (2011)
revision 1.0, 30 June 2011 |
ECRYPT II Yearly Report on Algorithms
and Key Lengths (2012)
revision 1.0, 30 September 2012 |
|
SymLab deliverables
|
The eHash Wiki (D.SYM.1) |
The eSTREAM Portfolio 2009 Annual Update (D.SYM.3)
revision 1.1, 1 October 2009 |
SHA-3 Design and Cryptanalysis Report (D.SYM.4)
revision 1.0, 27 August 2010 |
Lightweight Cryptographic Algorithms (D.SYM.5)
revision 1.0, 1 July 2010 |
New developments in symmetric key cryptanalysis (D.SYM.6)
revision 1.0, 30 June 2010 |
SHA-3 Intermediate Status Report (D.SYM.7)
revision 1.1, 20 October 2011 |
Second Lightweight Cryptography Status Report (D.SYM.8)
revision 1.0, 23 January 2012 |
New developments in symmetric key cryptanalysis (D.SYM.9)
revision 1.0, 20 December 2011 |
The eSTREAM Portfolio in 2012 (D.SYM.10)
revision 1.0, 16 January 2012 |
Final Hash Functions Status Report (D.SYM.11)
revision 1.0, 29 January 2013 |
Final Lightweight Cryptography Status Report (D.SYM.12)
revision 1.0, October 2012 |
Final Report on New developments in symmetric key cryptanalysis (D.SYM.13)
revision 1.0, 19 December 2012 |
|
MAYA deliverables
|
Wiki on Hard Problems in Cryptography (D.MAYA.1) |
Jointly Executed Research Activities on Design and Analysis
of Primitives and Protocols (D.MAYA.2)
revision 1.1, 31 January 2010 |
Main Computational Assumptions in Cryptography (D.MAYA.3)
revision 1.0, 29 April 2010 |
Final Report on Main Computational Assumptions in Cryptography (D.MAYA.6)
revision 1.0, 11 January 2013 |
Final Report on Jointly Executed Research Activities on Design and Analysis
of Primitives and Protocols (D.MAYA.7)
revision 1.1, December 2012 |
|
VAMPIRE deliverables
|
Report on Physical Security of Contact-less Cryptographic Devices (D.VAM.1)
revision 1.1, 10 August 2009 |
Report on Lightweight Cryptography (D.VAM.2)
revision 1.0, 8 July 2010 |
Performance evaluation of NIST hash function candidates (D.VAM.3)
revision 1.0, 18 January 2013 |
Report on Side-channel Aware Design Methods for Cryptographic Devices (D.VAM.4)
revision 1.3, 17 January 2013 |
Final Report on Efficient Implementation of Security Systems (D.VAM.5)
revision 1.0, 18 January 2013 |
Final Report on Physical Security (D.VAM.6)
revision 1.3, 17 January 2013 |
|