Index of /security/Crypto/

Index of /security/Crypto/


../
2001_applied_cryptography/                         05-Oct-2017 21:38       -
(eBook) Bruce Schneier - Applied Cryptography, ..> 07-Dec-2014 21:35      8M
00-cnam-cryptographie.pdf                          03-Feb-2009 21:31    199K
007.pdf                                            03-Feb-2009 21:31    143K
013-jgl.pdf                                        03-Feb-2009 21:31    272K
0501038.pdf                                        03-Feb-2009 21:31    105K
061.pdf                                            03-Feb-2009 21:31     70K
075.pdf                                            03-Feb-2009 21:31    127K
0764541889.pdf                                     03-Feb-2009 21:31    241K
126.pdf                                            03-Feb-2009 21:31    337K
144.pdf                                            03-Feb-2009 21:31     81K
147.pdf                                            03-Feb-2009 21:31    314K
148.pdf                                            03-Feb-2009 21:31    245K
199.pdf                                            03-Feb-2009 21:31     56K
1995meadows-asiacrypt94.pdf                        03-Feb-2009 21:31    134K
1998_Bleichenbacher_attack_rsa_pkcs#1.pdf          03-Mar-2016 20:01    646K
1998_feal.pdf                                      06-Jan-2015 22:45    281K
1999_linear_differential_cryptanalysis.pdf         03-Feb-2015 21:35    177K
2001_goodman_jssc.pdf                              03-Feb-2009 21:31    440K
2002_HDRThesis-US.pdf                              03-Feb-2009 21:31      2M
2002_attack_pkcs_rsa.pdf                           04-Apr-2016 09:57    129K
2002_the_discrete_logarithm_problem.pdf            15-Dec-2014 19:19    415K
2004_crypto_symetrique.pdf                         28-Feb-2016 17:33    280K
2004_preuve_cryptographique.pdf                    28-Dec-2014 21:49    679K
2004_sac_A4.pdf                                    03-Feb-2009 21:31    207K
2006_ec_attack_discret_logarithm.pdf               20-Nov-2016 19:35    588K
2007_cryptanalyse_clef_publique.pdf                28-Dec-2014 14:34      3M
2007_introduction_to_modern_cryptography.pdf       29-Jan-2014 18:06      6M
2010_a_course_in_crypto.pdf                        22-Mar-2015 18:08      2M
2010_cours_crypto.pdf                              21-Dec-2009 12:22     17M
2013_tutorial_on_whitebox_aes.pdf                  22-Mar-2015 14:50    727K
2014_applied_crypto_hardening.pdf                  08-Jan-2015 17:39      1M
2014_crypto_monnaie_pour_inverstisseurs.pdf        07-Dec-2014 13:09      3M
2014_mathematical_cryptography.pdf                 11-Sep-2016 13:00      1M
2014_perfect_forward_security.pdf                  12-Sep-2014 19:07    196K
2015_pohlig-hellman_ec.pdf                         31-Oct-2016 12:50    177K
2015_rsa_lattice_attacks.pdf                       12-Sep-2015 21:51    308K
2015_timing_attack_openssl_ecdsa.pdf               31-Aug-2015 08:32      1M
2015_weakning_crypto_systems.pdf                   13-Sep-2016 18:53    399K
2016_Codes_et_cryptologie.pdf                      28-Feb-2016 17:33    464K
2016_Crypto_101.pdf                                08-Sep-2016 18:12     16M
2016_drown_attack_ssl.pdf                          02-Mar-2016 19:22    412K
20thCenturyCryptoSpeech.txt                        03-Feb-2009 21:31     25K
4.pdf                                              03-Feb-2009 21:31    466K
A Course In Number Theory And Cryptography 2d e..> 07-Dec-2014 21:24      3M
AB-9800.pdf                                        03-Feb-2009 21:31    233K
AES_Algorithm_Efficiency.html                      03-Feb-2009 21:31     72K
AFP-crypto-liberee.html                            03-Feb-2009 21:31    2046
AGPS_01OCFB-paper.pdf                              03-Feb-2009 21:31    279K
Algebraic Aspects of Cryptography  - Neal Kobli..> 07-Dec-2014 21:24      2M
Applied Cryptography - Bruce Schenier.pdf          07-Jul-2016 13:56      3M
BRICS-RS-94-38.pdf                                 03-Feb-2009 21:31    293K
Beginning Cryptography with Java - David Hook.chm  07-Dec-2014 21:20      2M
CHJ_02ge.pdf                                       03-Feb-2009 21:31    275K
CSE-97-15.pdf                                      03-Feb-2009 21:31    466K
Chap_07.pdf                                        03-Feb-2009 21:31    167K
Complexity and Cryptography An Introduction - J..> 07-Dec-2014 21:23      3M
Contemporary Cryptography - Rolf Oppliger.pdf      07-Dec-2014 21:31      8M
Cryptography For Dummies - Chey Cobb.chm           07-Dec-2014 21:20      4M
Cryptography Theory And Practice - Douglas Stin..> 07-Dec-2014 21:34     17M
Cryptography and Network Security - William Sta..> 07-Jul-2016 13:56      8M
Cryptography and Network Security Principles an..> 07-Dec-2014 21:37     53M
Cryptography for Developers - Simon Johnson.pdf    07-Dec-2014 21:31      5M
Cryptography in C and C++ - Michael Welschenbac..> 07-Dec-2014 21:24      3M
Cryptography-1.pdf                                 03-Feb-2009 21:31     73K
Cryptography-3.pdf                                 03-Feb-2009 21:31     72K
CypherpunkManifesto.txt                            03-Feb-2009 21:31    5304
DPA.pdf                                            03-Feb-2009 21:31    217K
EffectiveSTL.pdf                                   14-May-2016 19:43      2M
Encryption Solution Design and Deployment Consi..> 07-Jul-2016 13:56      2M
Encryption in a Windows Environment EFS File, 8..> 07-Dec-2014 21:24      2M
FeteSc.pdf                                         03-Feb-2009 21:31    160K
Foundations of Cryptography A Primer - Oded Gol..> 07-Dec-2014 21:24      2M
Grund_Symmetric-Cryptography_Paper.pdf             03-Feb-2009 21:31    367K
Guide to Elliptic Curve Cryptography - Darrel H..> 07-Dec-2014 21:24      4M
HAVAL_paper.pdf                                    03-Feb-2009 21:31    268K
Handbook Of Applied Cryptography.pdf               07-Jul-2016 13:56     12M
Handbook of Applied Cryptography (Crc Press Ser..> 07-Dec-2014 21:24      5M
Handbook of Applied Cryptography - Alfred J. Me..> 07-Dec-2014 21:24      5M
I22Diff.pdf                                        03-Feb-2009 21:31    8080
I2_cryptologie.pdf                                 03-Feb-2009 21:31     64K
IC_TECH_REPORT_199938.pdf                          03-Feb-2009 21:31    183K
IDEA_0304.pdf                                      03-Feb-2009 21:31    308K
INTRODUCTION TO CRYPTOGRAPHY WITH JAVA APPLETS ..> 07-Dec-2014 21:36     10M
Image and Video Encryption From Digital Rights ..> 07-Dec-2014 21:31      8M
Implementing SSL_TLS Using Cryptography and PKI..> 07-Jul-2016 13:56      5M
IntroCrypto_fr.pdf                                 03-Feb-2009 21:31      3M
Java Cryptography - Jonathan B. Knudsen.pdf        07-Dec-2014 21:23      1M
Learn Encryption Techniques with BASIC and C++ ..> 07-Dec-2014 21:24      3M
LeeShiYinRivestRobshaw-OnPermutationOperationsI..> 03-Feb-2009 21:31    115K
LinuxChiffrement.pdf                               03-Feb-2009 21:31    399K
Malicious Cryptography - Exposing Cryptovirolog..> 07-Jul-2016 13:56     29M
Malicious Cryptography Exposing Cryptovirology ..> 07-Dec-2014 21:37     29M
Military Cryptanalysis.pdf                         07-Dec-2014 21:35     48M
Modern Cryptography Theory and Practice - Wenbo..> 07-Dec-2014 21:24      3M
Modern Cryptography Theory and Practice - Wenbo..> 07-Dec-2014 21:32     18M
NMWd95ca.pdf                                       03-Feb-2009 21:31    105K
NT.pdf                                             03-Feb-2009 21:31    240K
Nac95abs.pdf                                       03-Feb-2009 21:31     87K
NewsKeyRecoverySVV10.pdf                           03-Mar-2011 14:10    932K
PB-472.pdf                                         03-Feb-2009 21:31    157K
PROGRESS ON CRYPTOGRAPHY 25 Years of Cryptograp..> 07-Dec-2014 21:24      5M
Part_III.pdf                                       03-Feb-2009 21:31    520K
QC.pdf                                             03-Feb-2009 21:31      2M
RHUL-MA-2001-5.pdf                                 03-Feb-2009 21:31    501K
RSA02.pdf                                          03-Feb-2009 21:31    855K
RSA_hardware_implementation.pdf                    03-Feb-2009 21:31    279K
RabinCryptosystem.txt                              03-Feb-2009 21:31    8403
RivestKaliski-RSAProblem.pdf                       03-Feb-2009 21:31     97K
SaveVig.pdf                                        03-Feb-2009 21:31    476K
Simplecrypto.pdf                                   03-Feb-2009 21:31     42K
SubstGen.pdf                                       03-Feb-2009 21:31     79K
SurveyAsynchExt.pdf                                03-Feb-2009 21:31    149K
Tensors, differential forms, and variational pr..> 02-Feb-2017 15:27     13M
The CodeBreakers - Kahn David.pdf                  07-Dec-2014 21:25      1M
The_simple_ideal_cipher_system.pdf                 03-Feb-2009 21:31    104K
TuringPres.pdf                                     03-Feb-2009 21:31    270K
UserAuth.pdf                                       03-Feb-2009 21:31    390K
Wits00.pdf                                         03-Feb-2009 21:31     29K
XXXX_20years_attack_rsa.pdf                        19-Sep-2016 17:42    303K
XXXX_FEAL.pdf                                      10-Dec-2016 15:37    616K
XXXX_attaques_crypto.pdf                           15-Mar-2015 17:46      5M
XXXX_crypto_handbook_ch8.pdf                       31-Dec-2014 12:00    296K
XXXX_cryptoanblock.pdf                             28-Dec-2014 14:12    291K
XXXX_lattice_crypto_beginners.pdf                  28-Feb-2016 19:20      1M
XXXX_linear_diff_cryptanalysis.pdf                 13-Sep-2016 11:14    177K
XXXX_rsa.pdf                                       13-Dec-2014 23:20    126K
aes-crypto.pdf                                     03-Feb-2009 21:31    304K
alibaba.pdf                                        03-Feb-2009 21:31    227K
andreas3.pdf                                       03-Feb-2009 21:31      2M
arit.pdf                                           03-Feb-2009 21:31    202K
bear-lion.pdf                                      03-Feb-2009 21:31    152K
bit_order.pdf                                      03-Feb-2009 21:31     66K
bsa-final-report.txt                               03-Feb-2009 21:31     29K
c.pdf                                              03-Feb-2009 21:31     99K
cbtwirl.pdf                                        03-Feb-2009 21:31    118K
cfs.pdf                                            03-Feb-2009 21:31     82K
cfskey.pdf                                         03-Feb-2009 21:31     42K
chaffing-and-winnowing.txt                         03-Feb-2009 21:31     25K
ches99.pdf                                         03-Feb-2009 21:31    181K
cmc.pdf                                            03-Feb-2009 21:31    750K
cocaine-auction-protocol.pdf                       03-Feb-2009 21:31    227K
code.pdf                                           03-Feb-2009 21:31    198K
concours_aes.pdf                                   03-Feb-2009 21:31    471K
crypt.talk.pdf                                     03-Feb-2009 21:31    100K
crypto.pdf                                         03-Feb-2009 21:31    217K
crypto_mod.pdf                                     03-Feb-2009 21:31    173K
crypto_moderne.pdf                                 03-Feb-2009 21:31    205K
cryptoanalyse.pdf                                  03-Feb-2009 21:31     64K
cryptography_new.pdf                               03-Feb-2009 21:31    219K
cryptosizes.pdf                                    03-Feb-2009 21:31    438K
cucs-021-04.pdf                                    03-Feb-2009 21:31    131K
dean02.pdf                                         03-Feb-2009 21:31     94K
djalil-crypto.pdf                                  03-Feb-2009 21:31    157K
elec6703-2-3.pdf                                   03-Feb-2009 21:31     60K
esm.pdf                                            03-Feb-2009 21:31     60K
essay-037.pdf                                      03-Feb-2009 21:31     31K
examples.pdf                                       03-Feb-2009 21:31     37K
fawkes.pdf                                         03-Feb-2009 21:31    122K
fox_ujf.pdf                                        03-Feb-2009 21:31    402K
fse93.pdf                                          03-Feb-2009 21:31     77K
fusion.pdf                                         03-Feb-2009 21:31    148K
gladman.pdf                                        03-Feb-2009 21:31     45K
herys.pdf                                          03-Feb-2009 21:31     10K
high-perf-crypto.pdf                               03-Feb-2009 21:31     46K
histoire_cryptographie.pdf                         03-Feb-2009 21:31    215K
inc1.pdf                                           03-Feb-2009 21:31    259K
inc2.pdf                                           03-Feb-2009 21:31    237K
inchash.pdf                                        03-Feb-2009 21:31    427K
internet-modes.pdf                                 03-Feb-2009 21:31     62K
ipsec.pdf                                          03-Feb-2009 21:31    216K
katmct.pdf                                         03-Feb-2009 21:31     98K
key-mngmt-crypto-fs.pdf                            03-Feb-2009 21:31     57K
keyrecovery.pdf                                    03-Feb-2009 21:31    169K
lars_knudsen.pdf                                   03-Feb-2009 21:31    301K
lpe.pdf                                            03-Feb-2009 21:31    242K
marco.pdf                                          03-Feb-2009 21:31    233K
matrices.pdf                                       03-Feb-2009 21:31    121K
md5-vs-sha.txt                                     03-Feb-2009 21:31    4944
md5_someday.pdf                                    03-Feb-2009 21:31     55K
memoire-julien.pdf                                 03-Feb-2009 21:31    720K
modesv2.pdf                                        03-Feb-2009 21:31    118K
musee.pdf                                          03-Feb-2009 21:31    718K
new_introduction_crypto.pdf                        03-Feb-2009 21:31    278K
oakland.pdf                                        03-Feb-2009 21:31    263K
ocb-full.pdf                                       03-Feb-2009 21:31    659K
ocf.pdf                                            03-Feb-2009 21:31    133K
odyssey.pdf                                        03-Feb-2009 21:31    120K
onetime.pdf                                        03-Feb-2009 21:31     50K
paper716.pdf                                       03-Feb-2009 21:31     76K
paper722.pdf                                       03-Feb-2009 21:31     34K
paper723.pdf                                       03-Feb-2009 21:31     30K
paper724.pdf                                       03-Feb-2009 21:31     85K
paper726.pdf                                       03-Feb-2009 21:31     46K
paper732.pdf                                       03-Feb-2009 21:31     33K
paper735.pdf                                       03-Feb-2009 21:31     33K
paper736.pdf                                       03-Feb-2009 21:31     38K
paper737.pdf                                       03-Feb-2009 21:31    101K
paper738.pdf                                       03-Feb-2009 21:31    135K
paper740.pdf                                       03-Feb-2009 21:31     40K
paper751.pdf                                       03-Feb-2009 21:31     33K
paper764.pdf                                       03-Feb-2009 21:31     70K
paper768.pdf                                       03-Feb-2009 21:31     60K
paper874.pdf                                       03-Feb-2009 21:31     73K
paper878.pdf                                       03-Feb-2009 21:31    271K
paper879.pdf                                       03-Feb-2009 21:31    245K
paper885.pdf                                       03-Feb-2009 21:31    395K
paper886.pdf                                       03-Feb-2009 21:31     72K
perf.pdf                                           03-Feb-2009 21:31    179K
pitfalls.pdf                                       03-Feb-2009 21:31     56K
preprint_frey.pdf                                  03-Feb-2009 21:31    336K
qbsc_2004.pdf                                      03-Feb-2009 21:31     62K
queensland.pdf                                     03-Feb-2009 21:31    202K
robustness.pdf                                     03-Feb-2009 21:31    123K
secret_key_cryptography.pdf                        03-Feb-2009 21:31      1M
shi_asap00.pdf                                     03-Feb-2009 21:31     63K
skipjack-kea.pdf                                   03-Feb-2009 21:31    214K
text.pdf                                           03-Feb-2009 21:31     26K
thesis-ac.pdf                                      03-Feb-2009 21:31    668K
thesis.pdf                                         03-Feb-2009 21:31      2M
trapdoor.pdf                                       03-Feb-2009 21:31     41K
understanding_ssl.pdf                              03-Feb-2009 21:31    265K
usenix00.pdf                                       03-Feb-2009 21:31    293K
wake.pdf                                           03-Feb-2009 21:31    150K