Cryptographic Hash Functions and the NIST SHA3Competition Thisbreakthroughhasresultedinaurryofresearch,resultinginnewconstructionsandagrowingbodyoffoundationalresearch.
Hardware SoftwareCoverificationofCryptographicAlgorithmsusingCryptol Languagetailoredtothecryptodomain,Designedwithfeedbackfromcryptographers
HighLevel Synthesis of Cryptographic Hardware HighLevelSynthesisTools。Cryptol--FunctionalDomainSpecificLanguage
On the Use of Cryptol a Cryptography Domain Specific Language OntheUseofCryptol,aCryptographyDomainSpecificLanguage.
cryptol Specification cryptolSpecification,ImplementationandVerificationofHigh-GradeCryptographicApplications
Pragmatic Equivalence and Safety Checking in Cryptol Toreducethecostofdeveloping,certifying,anddeployingcryptographicapplications
applyingsatisfiabilitytotheanalysisofcryptography cryptographic operations as sat problems translating algorithms to propositional logic
UsingCryptoltoexploreellipticcurve_basedrandom_numbergenerators To tackle how this works behind the curtain, this project aims at exploring the Dual EC DRNG, an algorithm standardized by NIST as a cryptographically
Cryptol The Language of Cryptography Cryptanalysis Applying Cryptol to cryptanalysis,This talk will cover these topics and show their use in a cryptanalysis demo using Cryptol.