/#1 ussue - 19.07.2010/
|
[21] Cryptography and Security Services Mechanisms and Applications - Cybertech Publishing, 2008.pdf
|
63.3 MB
|
[29] Introduction to Automata Theory, Languages, and Computation (2nd Edition) - Addison Wesley, 2000.pdf
|
59.4 MB
|
[35] Practical Cryptology and Web Security - Pearson Education, 2005.pdf
|
26.4 MB
|
[30] Mathematical Foundations of Computer Science 2008 - 33rd International Symposium, MFCS 2008, Torun, Poland, August 25-29, 2008, Proceedings - Springer, 2008.pdf
|
22.1 MB
|
[04] An Introduction to Formal Languages and Automata - Jones and Bartlett Publishers, 2000.pdf
|
22.0 MB
|
[11] CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One) - McGraw-Hill, 2007.pdf
|
21.8 MB
|
07 - Криптография на С и С++ в действии. Учебное пособие - Вельшенбах, 2004.djvu
|
20.8 MB
|
[22] Disappearing cryptography second edition information hiding steganography and watermarking - Morgan Kaufmann Publishers, 2002.pdf
|
19.8 MB
|
[06] Applied Cryptanalysis Breaking Ciphers in the Real World - John Wiley & Sons, 2007.pdf
|
19.6 MB
|
[03] Advances in Cryptology - Crypto 2004 24th Annual International Cryptology Conference, Santa Barbara, California - Springer, 2005.pdf
|
19.6 MB
|
[16] Cryptographic Hardware and Embedded Systems - CHES 2004 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings - Springer, 2005.pdf
|
19.3 MB
|
10 - Современная криптография. Теория и практика - Венбо Мао, 2005.djvu
|
19.3 MB
|
[09] CCNA Security Course Booklet, Version 1.0 - Cisco Press, 2009.pdf
|
18.0 MB
|
[17] Cryptographic Hardware and Embedded Systems - CHES 2005 7th International Workshop - Springer, 2005.pdf
|
17.7 MB
|
[31] Mechanics of User Identification and Authentication- Fundamentals of Identity Management - Auerbach Publications, 2007.pdf
|
17.5 MB
|
09 - Практическая криптография - Фергюсон, 2005.djvu
|
17.4 MB
|
[10] CCNA Security Lab Manual - Cisco Press, 2009.pdf
|
16.8 MB
|
[15] Cryptographic Hardware and Embedded Systems - CHES 2002 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002 - Springer, 2003.pdf
|
16.7 MB
|
[27] Hardware-based Computer Security Techniques to Defeat Hackers- From Biometrics to Quantum Cryptography - John Wiley & Sons, 2008.pdf
|
15.4 MB
|
11 - Элементарное введение в элептическую криптографию - Болотов А.А. и др., 2006.djvu
|
15.3 MB
|
[26] Handbook of Remote Biometrics- for Surveillance and Security (Advances in Pattern Recognition) - Springer, 2009.pdf
|
14.1 MB
|
[18] Cryptography and Network Security (4th Edition) - Prentice Hall, 2005.chm
|
13.0 MB
|
[14] Cryptanalysis - Dover Publications, 1989.pdf
|
12.6 MB
|
[19] Cryptography and Public Key Infrastructure on the Internet - John Wiley & Sons, 2001.pdf
|
12.6 MB
|
04 - Компьютерные сети - Таненбаум, 2003.djvu
|
10.6 MB
|
[13] Comptia security 2008 in depth - Course technology, 2009.pdf
|
10.2 MB
|
[12] CompTIA Security+ All-in-One Exam Guide, Second Edition - McGraw-Hill, 2008.pdf
|
9.7 MB
|
07 - Криптография на С и С++ в действии. Учебное пособие - Вельшенбах, 2004 (CD-DISK).rar
|
9.5 MB
|
[01] A Classical Introduction to Cryptography Exercise Book - Springer, 2005.pdf
|
9.4 MB
|
05 - Криптография. Мир программирования - Смарт, 2005.pdf
|
8.8 MB
|
[32] Multimedia Content Encryption - Techniques and Applications - Auerbach Publications, 2008.pdf
|
8.7 MB
|
03 - Дискретная математика и комбинаторика - Андерсон, 2004.djvu
|
8.3 MB
|
08 - Основы современной криптографии для специалистов в информационных технологиях - Рябко, Фионов, 2004.djvu
|
8.0 MB
|
02 - Алгоритмы шифрования.Справочник. - Панасенко, 2009.djvu
|
7.8 MB
|
[05] An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics) - Springer, 2008.pdf
|
7.7 MB
|
[41] Understanding Cryptography A Textbook for Students and Practitioners - Springer, 2009.pdf
|
7.1 MB
|
[36] Quantum Optics (Oxford Graduate Texts) - Oxford University Press, 2008.pdf
|
7.0 MB
|
[28] Innovative Cryptography (Programming Series) - Charles River, 2006.pdf
|
6.9 MB
|
[39] Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings - Springer, 2008.pdf
|
5.9 MB
|
[24] Error Correcting Coding and Security for Data Networks - Analysis of the Superchannel Concept - John Wiley & Sons, 2005.pdf
|
5.1 MB
|
[20] Cryptography and security services mechanisms and applications - Cybertech Publishing, 2007.pdf
|
5.0 MB
|
[23] Disappearing cryptography third edition information hiding steganography watermarking - Morgan Kaufmann Publishers, 2009.pdf
|
5.0 MB
|
[33] Pairing-Based Cryptography Pairing 2008 - Second International Conference, Egham, UK, September 1-3, 2008, Proceedings (Lecture Notes in Computer Science) - Springer, 2008.pdf
|
4.6 MB
|
[25] Finite Automata and Application to Cryptography - Springer, 2009.pdf
|
3.5 MB
|
[08] Basics of Contemporary Cryptography for IT Practitioners - World Scientific Publishing, 2005.pdf
|
3.3 MB
|
[38] Secure multi-party non-repudiation protocols and applications advances in information security - Springer, 2009.pdf
|
3.2 MB
|
[34] Post Quantum Cryptography - Springer, 2008.pdf
|
2.4 MB
|
[02] Advanced Encryption Standard - AES 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004 - Springer, 2005.pdf
|
2.2 MB
|
[37] Secure key establishment advances in information security - Springer, 2009.pdf
|
1.9 MB
|
[07] Automata Theory with Modern Applications - Cambridge University Press, 2006.pdf
|
1.6 MB
|
06 - Криптография и теория кодирования - Сидельников.djvu
|
1.5 MB
|
01 - 25 этюдов о шифрах - С.А.Дориченко, 1994.djvu
|
1.0 MB
|
[40] The Twofish Encryption Algorithm A 128-Bit Block Cipher - John Wiley & Sons, 1999.chm
|
635.1 KB
|
/Articles/
|
Quantum Cryptography. Public key distribution and coin tossing - C. H. Bennett and G. Brassard (1984).pdf
|
1.9 MB
|
Side Channel Cryptanalysis of a High Order Masking Scheme - J.S. Coron and E. Prouff and M. Rivain (Proceedings of CHES 2007, LNCS, 2007).pdf
|
1.5 MB
|
Quantum Cryptography. A study into the present technologies and future applications - Bill Grindlay (2003).pdf
|
928.2 KB
|
Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform - J.S. Coron, C. Giraud etc (Proceedings of CHES 2008, LNCS, 2008).pdf
|
563.8 KB
|
Quantum Cryptography Based on Bell's Theorem - Artur K. Ekert (1991).pdf
|
467.1 KB
|
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages - J.S. Coron, H. Handschuh etc (Proceedings of PKC '02, Lecture Notes in Computer Science, Springer-Verlag, 2002).pdf
|
425.1 KB
|
Optimal security proofs for PSS and other signature schemes - J.S. Coron (Proceedings of Eurocrypt '02, Lecture Notes in Computer Science, Springer-Verlag, 2002).pdf
|
385.3 KB
|
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves - E. Brier, J.S. Coron (Proceedings of CRYPTO 2010, LNCS, 2010).pdf
|
371.7 KB
|
An Efficient Method for Random Delay Generation in Embedded Software - J.S. Coron and I. Kizhvatov (Proceedings of CHES 2009, LNCS, 2009).pdf
|
361.6 KB
|
Practical Cryptanalysis of ISO - IEC 9796-2 and EMV Signatures - J.S. Coron, D. Naccache etc (Proceedings of Crypto 2009, LNCS, 2009).pdf
|
342.3 KB
|
On the security of RSA padding - J.S. Coron, D. Naccache and J.P. Stern (Proceedings of Crypto '99, Lecture Notes in Computer Science, Springer-Verlag, 1999).pdf
|
327.6 KB
|
Cryptanalysis of ISO-IEC 9796-1 - Don Coppersmith, Jean-Sebastien Coron etc (Journal of Cryptology, Volume 21, Number 1, 2008).pdf
|
322.6 KB
|
An accurate evaluation of maurer's universal test - J.S. Coron and D. Naccache (Proceedings of SAC'98, Lecture Notes in Computer Science, Springer-Verlag, 1998 ).pdf
|
320.1 KB
|
A Domain Extender for the Ideal Cipher - J.S. Coron, Y. Dodis, A. Mandal and Y. Seurin (Proceedings of TCC 2010, LNCS, 2010).pdf
|
317.0 KB
|
The Random Oracle Model and the Ideal Cipher Model are Equivalent - J.S. Coron, J. Patarin and Y. Seurin (Proceedings of Crypto 2008, LNCS, 2008).pdf
|
308.0 KB
|
GEM. a Generic Chosen-Ciphertext Secure Encryption Method - J.S. Coron, H. Handschuh etc (Proceedings of CT-RSA '02, Lecture Notes in Computer Science, Springer-Verlag, 2002).pdf
|
297.1 KB
|
Universal padding schemes for RSA - J.S. Coron, M. Joye, D. Naccache and P. Paillier (Proceedings of Crypto '02, Lecture Notes in Computer Science, Springer-Verlag, 2002).pdf
|
288.7 KB
|
New attacks on PKCS#1 v1.5 encryption - J.S. Coron, D. Naccache, M. Joye and P. Paillier (Proceedings of Eurocrypt '00, Lecture Notes in Computer Science, Springer-Verlag, 2000).pdf
|
271.0 KB
|
Fault Attacks on RSA Signatures with Partially Unknown Messages - J.S. Coron, A. Joux etc (Proceedings of CHES 2009, LNCS, 2009).pdf
|
264.2 KB
|
On the security of random sources - J.S. Coron (Proceedings of PKC '99, Lecture Notes in Computer Science, Springer-Verlag, 1999).pdf
|
245.0 KB
|
Security analysis of the Gennaro-Halevi-Rabin signature scheme - J.S. Coron and D. Naccache (Proceedings of Eurocrypt '00, Lecture Notes in Computer Science, Springer-Verlag, 2000).pdf
|
236.4 KB
|
Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring - Jean-Sebastien Coron and Alexander May (Journal of Cryptology, Volume 20, Number 1, January 2007).pdf
|
235.1 KB
|
Merkle-Damgard Revisited- how to construct a hash-function - J.S. Coron, Y. Dodis (Proceedings of Crypto 2005, LNCS, 2005).pdf
|
235.0 KB
|
Resistance against Differential Power Analysis for elliptic curves cryptosystems - J.S. Coron (Proceedings of CHES '99, Lecture Notes in Computer Science, Springer-Verlag, 1999).pdf
|
229.6 KB
|
A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis - J.S. Coron, D. Lefranc and G. Poupard (Proceedings of CHES 2005, LNCS, 2005).pdf
|
226.3 KB
|
Finding collisions in the full SHA-1 - X. Wang and H. Yu (Crypto’05. Santa Barbara, CA, 2005).pdf
|
217.3 KB
|
Fault Attacks Against EMV Signatures - J.S. Coron, D. Naccache and M. Tibouchi (Proceedings of CT-RSA 2010, LNCS, 2010).pdf
|
204.8 KB
|
From fixed-length to arbitrary length RSA padding schemes - J.S. Coron, F. Koeune and D. Naccache (Proceedings of Asiacrypt '00, Lecture Notes in Computer Science, Springer-Verlag, 2000).pdf
|
200.1 KB
|
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009 - J.S. Coron and I. Kizhvatov (Proceedings of CHES 2010, LNCS, 2010).pdf
|
198.6 KB
|
PSS is Secure against Random Fault Attacks - J.S. Coron and A. Mandal (Proceedings of ASIACRYPT 2009, LNCS, 2009).pdf
|
181.1 KB
|
On the exact security of Full Domain Hash - J.S. Coron (Proceedings of Crypto '00, Lecture Notes in Computer Science, Springer-Verlag, 2000).pdf
|
178.6 KB
|
On Boolean and Arithmetic Masking against Differential Power Analysis - J.S. Coron and L. Goubin (Proceedings of CHES '00, Lecture Notes in Computer Science, Springer-Verlag, 2000).pdf
|
162.9 KB
|
Finding small roots of bivariate integer equations revisited - J.S. Coron (Proceedings of Eurocrypt 2004, LNCS, 2004).pdf
|
162.9 KB
|
Finding Small Roots of Bivariate Integer Polynomial Equations - a Direct Approach - J.S. Coron (Proceedings of Crypto 2007, LNCS, 2007).pdf
|
161.3 KB
|
A New DPA Countermeasure Based on Permutation Tables - J.S. Coron (Proceedings of SCN 2008, LNCS, 2008).pdf
|
157.3 KB
|
Index Calculation Attacks on RSA Signature and Encryption - J.S. Coron, Y. Desmedt etc (Des. Codes Cryptography, vol. 38, Number 1, January, 2006).pdf
|
152.3 KB
|
Cryptanalysis of RSA signatures with fixed pattern padding - E. Brier, C. Clavier (Proceedings of Crypto '01, Lecture Notes in Computer Science, Springer-Verlag, 2001).pdf
|
150.1 KB
|
A New Algorithm for Switching from Arithmetic to Boolean Masking -J.S. Coron and A. Tchulkine (Proceedings of CHES '03, Lecture Notes in Computer Science, Springer-Verlag, 2003).pdf
|
116.5 KB
|
Boneh et al's k-Element Aggregate Extraction Assumption Is Equivalent to The Diffie-Hellman Assumption - J.S. Coron and D. Naccache (Proceedings of Asiacrypt '03, Lecture Notes in Computer Science, Springer-Verlag, 2003).pdf
|
114.9 KB
|
On the Implementation of a Fast Prime Generation Algorithm - C. Clavier and J.S. Coron (Proceedings of CHES 2007, LNCS, 2007).pdf
|
109.9 KB
|
Cryptanalysis of a Provably Secure CRTRSA - David Wagner (University of California at Berkeley) article.pdf
|
109.0 KB
|
Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95 - J.S. Coron and D. Naccache (Proceedings of CT-RSA 2004, Lecture Notes in Computer Science, Springer-Verlag, 2004).pdf
|
87.2 KB
|
/#2 ussue - 08.08.2010/
|
[28] Malicious Cryptography. Exposing Cryptovirology - Adam Young, Moti Yung (Wiley, 2004).pdf
|
30.5 MB
|
[24] Introduction to Cryptography - Johannes Buchmann (Springer, 2000).pdf
|
29.7 MB
|
[41] The Mathematics of Ciphers - Number Theory and RSA Cryptography - S. C. Coutinho (AK Peters, Ltd, 1998).pdf
|
24.2 MB
|
12 - Основы Криптологии. Профессиональное руководство и интерактивный учебник - Х.К.А.ван Тилборг (МИР, 2006).pdf
|
22.7 MB
|
11 - Основы криптографии - А. П. Алферов, А. Ю. Зубов, А. С. Кузьмин, А. В. Черемушкин (Гелиос АРВ, 2005).djvu
|
19.6 MB
|
03 - Булевы функции в теории кодирования и криптологии -.О. А. Логачев, А. А. Сальников, В. В. Ященко (МЦНМО,2 004).djvu
|
19.1 MB
|
[13] Cryptographic Engineering - Cetin Kaya Koc (Springer, 2008).pdf
|
17.6 MB
|
[12] Cryptographic Algorithms on Reconfigurable Hardware (Signals and Communication Technology) - Francisco Rodriguez-Henriquez, N.A. Saqib, A. Diaz-Perez, Cetin Kaya Koc (Springer, 2006).pdf
|
16.6 MB
|
[44] User's Guide To Cryptography And Standards - Alex W. Dent, Chris J. Mitchell (Artech House, 2004).pdf
|
14.9 MB
|
09 - Математические основы криптологии - Ю. С. Харин, В. И. Берник и т.д. (БГУ, 1999).djvu
|
13.9 MB
|
05 - Дискретная математика и криптология. Курс лекций - В. М. Фомичев (Диалог-МИФИ, 2003).djvu
|
13.6 MB
|
[19] Decrypted Secrets. Methods and Maxims of Cryptology - Friedrich L. Bauer (Springer, 4th ed. edition, 2006).pdf
|
12.9 MB
|
[21] Elliptic Curves - Number Theory and Cryptography, Second Edition - Lawrence C. Washington (Chapman & Hall or CRC, 2008).rar
|
10.8 MB
|
10 - Основы кодирования - М. Вернер (Техносфера, 2004).pdf
|
9.9 MB
|
[36] RSA Security's Official Guide to Cryptography - Steve Burnett, Stephen Paine (McGraw-Hill Osborne Media, 2001).pdf
|
9.6 MB
|
08 - Криптографические методы защиты информации - Рябко Б.Я., Фионов А.Н ()Горячая Линия - Телеком, 2005.djvu
|
9.5 MB
|
[10] Cracking Codes and Cryptograms For Dummies - Denise Sutherland, Mark Koltko-Rivera (For Dummies, 2009).pdf
|
9.4 MB
|
[08] Codes over Rings (Series on Coding Theory and Cryptology) - Patrick Solo (World Scientific Publishing Company, 2009).pdf
|
9.2 MB
|
[33] Quantum Computation and Quantum Information - Michael A. Nielsen (Cambridge University Press, 2000).djvu
|
7.8 MB
|
14 - Стандарт криптографической защиты - AES. Конечные поля - О. С. Зензин, М. А. Иванов (КУДИЦ-Образ, 2002).djvu
|
7.4 MB
|
07 - Компьютерная безопасность. Криптографические методы защиты - Петров А.А (2000).djvu
|
6.8 MB
|
17 - Элементы криптографии. Основы теории защиты информации - В. И. Нечаев (Высшая школа, 1999).djvu
|
6.2 MB
|
[23] Information Security. Fundamentals - John A. Blackley , Justin Peltier, Thomas R. Peltier (Auerbach Publications, 2003).pdf
|
6.1 MB
|
[32] Public Key Cryptography. PKC 2010 - Phong Q. Nguyen, David Pointcheval (Springer, 2010).pdf
|
5.8 MB
|
01 - Аутентификация. От паролей до открытых ключей - Ричард Э. Смит (Вильямс, 2002).djvu
|
5.7 MB
|
[30] Progress in Cryptology. Africacrypt 2010 - Daniel J. Bernstein, Tanja Lange (Springer, 2010).pdf
|
5.7 MB
|
[05] Codes- The Guide to Secrecy From Ancient to Modern Times - Richard A. Mollin (Chapman & Hall or CRC, 2005).pdf
|
5.7 MB
|
[40] The Cryptoclub - Using Mathematics to Make and Break Secret Codes - Janet Beissinger, Vera Pless (AK Peters Ltd, 2006).djvu
|
5.5 MB
|
[40] The Cryptoclub - Using Mathematics to Make and Break Secret Codes - WorkBook.pdf
|
5.3 MB
|
[14] Cryptography for Developers - Tom St Denis (Syngress Publishing, 2006).pdf
|
5.3 MB
|
[03] Applied Quantum Cryptography - Christian Kollmitzer, Mario Pivk (Springer, 2010).pdf
|
5.2 MB
|
[18] Cryptology Unlocked - Reinhard Wobst, Angelika Shafir (Wiley, 2007).pdf
|
4.9 MB
|
13 - Словарь криптографических терминов - Погорелов Б.А. (ред) (2006).pdf
|
4.8 MB
|
[42] The Physics Of Quantum Information Quantum Cryptography, Teleportation, Computation - Bouwmeester et al. (Springer, 2000).djvu
|
4.3 MB
|
[17] Cryptography in C and C++ - Michael Welschenbach (Apress, 2001).chm
|
3.7 MB
|
[07] Codes An Introduction to Information Communication and Cryptography - Norman L. Biggs (Springer, 2008).pdf
|
3.6 MB
|
[35] RSA and Public-Key Cryptography - Richard A. Mollin (Chapman & Hall or CRC, 2002).rar
|
3.5 MB
|
15 - Физика квантовой информации - Боумейстер.и.др (2002).djvu
|
3.5 MB
|
[38] The Code Book- The Science of Secrecy from Ancient Egypt to Quantum Cryptography - SIMON SINGH (Anchor , 2000).pdf
|
3.0 MB
|
[27] Learn Encryption Techniques with Basic And C++ - Gilbert Held (Wordware Publishing, 1998).chm
|
2.9 MB
|
[02] Algorithmic Cryptanalysis - Antoine Joux (Chapman & Hall or CRC, 2009).pdf
|
2.8 MB
|
16 - Элементарное введение в эллиптическую криптографию. Алгебраические и алгоритмические основы - Болотов А.А., Гашков С.Б., Фролов А.Б (КомКнига, 2006).pdf
|
2.6 MB
|
[26] Kryptologie- Algebraische Methoden und Algorithmen - Christan Karpfinger, Hubert Kiechle (Vieweg+Teubner Verlag, 2009) German.pdf
|
2.4 MB
|
06 - Защита информации в компьютерных системах и сетях - Ю. В. Романец, П. А. Тимофеев, В. Ф. Шаньгин (Радио и связь, 2001).djvu
|
2.3 MB
|
[04] Brute Force - Cracking the Data Encryption Standard - Matt Curtin (Springer, 2005).pdf
|
2.2 MB
|
[16] Cryptography in C and C++, Second Edition - Michael Welschenbach (Apress, 2005).pdf
|
2.2 MB
|
[09] Coding and Cryptology - Yongqing Li, San Ling, Harald NiederreiterHuaxiong (World Scientific Publishing Company, 2008).pdf
|
2.2 MB
|
[22] Elliptic Curves and Their Applications to Cryptography. An Introduction - Andreas Enge (Springer, 1999).pdf
|
2.0 MB
|
[20] Digital Signatures (Advances in Information Security) - Jonathan Katz (Springer, 2010).pdf
|
1.8 MB
|
[06] Codes and Cryptography - Dominic Welsh (Oxford University Press, 1998).djvu
|
1.8 MB
|
[39] The Codebreakers. The Story of Secret Writing - David Kahn (Macmillan Pub Co, 1974).pdf
|
1.8 MB
|
[25] Kerberos- The Definitive GuideKerberos - Jason Garman (O'Reilly 2003).chm
|
1.5 MB
|
[34] Quantum Cryptography - N. Gisin, G. Ribordy, W. Tittel, H. Zbinden (arXiv, 2001).pdf
|
1.4 MB
|
[37] ]SSL & TLS Essentials. Securing the Web free - Stephen A. Thomas (Wiley, 2000).pdf
|
1.4 MB
|
[15] Cryptography for Internet & Database Applications - Nick Galbreath, Nicholas Galbreath (Wiley, 2002).pdf
|
1.4 MB
|
12 - Основы Криптологии. Профессиональное руководство и интерактивный учебник - CD-DISK.rar
|
1.4 MB
|
[43] Understanding PKI. Concepts, Standards, and Deployment Considerations. Second Edition - Carlisle Adams, Steve Lloyd (Addison Wesley, 2002).chm
|
1.2 MB
|
[31] Protecting Information. From Classical Error Correction to Quantum Cryptography - Loepp,Wootters (Cambridge University Press, 2006).pdf
|
1.0 MB
|
04 - Взломщики кодов - Дэвид Кан (Центрполиграф, 2000).rtf
|
992.5 KB
|
[01] A brief introduction of quantum cryptography for engineers - Bing Qi, Li Qian, Hoi-Kwong Lo (arXiv, 2010).pdf
|
651.0 KB
|
[11] CRYPTANALYSIS OF RSA USING ALGEBRAIC AND LATTICE METHODS - Glenn Durfee (2002) a dissertation.pdf
|
570.7 KB
|
02 - Булева алгебра, комбинационные схемы, преобразования двоичных последовательностей - И. Л. Ерош (СПб. ГУАП, 2001).pdf
|
300.1 KB
|
[29] Number Theory and related Algorithms in Cryptography - Alireza Nemaney Pour,2002.pdf
|
256.1 KB
|
/Base/Квантовая крипто/Статьи/
|
Quantum key distribution over 67 km with a plug&play system.pdf
|
439.3 KB
|
Квантовая криптография- основы разработки и информационное обеспечение.pdf
|
202.1 KB
|
О одном подходе к построению квантовых кодов II.pdf
|
188.4 KB
|
О одном подходе к построению квантовых кодов.pdf
|
184.5 KB
|
Алгоритм выработки общего ключа с помощью квантового канала связи.pdf
|
163.5 KB
|
Квантовая криптография- дорогая игрушка или технология будущего - Винокуров.doc
|
123.9 KB
|
Квантовая криптография - Красавин.doc
|
100.4 KB
|
Квантовая криптография - Семенов.doc
|
99.8 KB
|
О НЕСТОЙКОСТИ КВАНТОВОЙ КРИПТОГРАФИИ - Горшков.doc
|
24.6 KB
|
Что не так с классической криптографией.mht
|
20.1 KB
|
/Base/Квантовая крипто/
|
Quantum cryptography (2002) - group of applied phyzics.pdf
|
1.9 MB
|
Quantum cryptography (2004) - group of applied phyzics.pdf
|
1.4 MB
|
A Quantum Leap for Cryptography.pdf
|
669.2 KB
|
Quantum Information Theory and Applications to Quantum Cryptography - Nikolaos P. Papadakos.pdf
|
409.8 KB
|
A quick glance at quantum cryptography - Lomonaco S. J.djvu
|
383.8 KB
|
Plug and Play quantum cryptography.pdf
|
155.9 KB
|
/Base/Криптография/
|
Dr.Dobb's essential books on cryptography and security (1997).rar
|
252.0 MB
|
Работы по теории информации и кибернетике (1963) - Шеннон.pdf
|
39.7 MB
|
Fundamentals of cryptology. A professional reference and interactive tutorial.pdf
|
31.1 MB
|
Cryptographic Hardware and Embedded Systems (2005) - Springer.pdf
|
19.3 MB
|
Modern Cryptography Theory and Practice (2003) - By Wenbo Mao.pdf
|
18.7 MB
|
Cryptography Theory And Practice - Douglas Stinson.chm
|
15.2 MB
|
A Computational Introduction To Number Theory And Algebra (2005) - Cambridge University Press.pdf
|
14.0 MB
|
Modern Cryptography Protect Your Data with Fast Block Ciphers (2003) -Goots,Izotov,Moldovyan,Moldovya.chm
|
12.1 MB
|
Теоретическая криптография - Ростовцев А.Г., Маховенко Е.Б.djvu
|
10.0 MB
|
Contemporary Cryptography (2005) - Artech House.pdf
|
8.0 MB
|
Handbook of applied cryptography (1997) - Menezes A., van Oorschot P., Vanstone S.djvu
|
6.6 MB
|
Прикладная криптография. Использование и синтез криптографических интерфейсов - Щербаков Л.Ю., Домашев А.В.djvu
|
5.5 MB
|
Progress On Cryptography. 25 Years Of Cryptography In China (2003) - Kluwer Academic Pub.pdf
|
5.2 MB
|
Advances in Elliptic Curve Cryptography (2005) - Cambridge University Press.pdf
|
4.9 MB
|
Guide to Elliptic Curve Cryptography - D. Hankerson, A. Menezes, S. Vanstone.pdf
|
4.6 MB
|
Cryptography For Dummies (2004) - Cobb.chm
|
4.2 MB
|
Cryptographie - Stinson (france).djvu
|
4.1 MB
|
Анализ и синтез криптоалгоритмов (2000) - Грушо,Применко,Тимонина.pdf
|
4.0 MB
|
Cryptography.An introduction to computer security.1989 - Sebery J.pdf
|
3.9 MB
|
Internet Security. Cryptographic Principles, Algorithms And Protocols (2003) - Man Young Rhee.pdf
|
3.8 MB
|
Прикладная криптография - Шнайер Б..pdf
|
3.5 MB
|
Complexity and Cryptography An Introduction (2006) - Cambridge University Press.pdf
|
3.4 MB
|
A Course In Number Theory And Cryptography (2nd ed.) - Koblitz Neal.djvu
|
3.4 MB
|
Applied Cryptography SE Protocols, Algorthms, and Source Code in C (1996) - Bruce Schneier.pdf
|
3.1 MB
|
A Computational Introduction To Number Theory and Algebra (2004) - Victor Shoup.pdf
|
3.0 MB
|
Ведение в теорию чисел. Алгоритм RSA (2001) - Коутинхо.djvu
|
2.8 MB
|
Cryptographic Security. Architecture, Design and Verification - Springer.pdf
|
2.8 MB
|
Поточные шифры. Результаты зарубежной открытой криптологии (1997).rar
|
2.7 MB
|
BigNum Math. Implementing Cryptographic Multiple Precision Arithmetic (2006) - Denis T., Rose G.djvu
|
2.5 MB
|
Теоретико-числовые алгоритмы в криптографии (2003) - Василенко.PDF
|
2.5 MB
|
Приложение теории детерминированного хаоса в криптографии (2002) - Птицын.pdf
|
2.3 MB
|
Курс теории чисел и криптографии (2001) - Коблиц.djvu
|
2.3 MB
|
Lecture Notes on Cryptography (2001) - Goldwasser S., Belare M.pdf
|
2.0 MB
|
Основы технологии PKI (2004) - Горбатов B.C., Полянская О.Ю.pdf
|
2.0 MB
|
Введение в криптографию - Ященко.djvu
|
1.8 MB
|
Криптография с открытым ключом (1995) - Салоома.djvu
|
1.6 MB
|
Современная криптология (1999) - Брассар.djvu
|
1.6 MB
|
Foundations of Cryptography.pdf
|
1.5 MB
|
Основы криптографических алгоритмов (2002) - Гатчин о.Р., Коробейников А.Г.pdf
|
1.5 MB
|
Cryptography. A Very Short Intro (2002) - Piper,Murphy.chm
|
1.4 MB
|
Codes and Ciphers. Julius Caesar the Enigma and the Internet (2004) - Cambridge University Press.pdf
|
1.3 MB
|
Совершенные шифры (2003) - Зубов.rar
|
1.2 MB
|
Криптография и компьютерная безопасность - Файстель Х..pdf
|
1.1 MB
|
Theorie des nombres et cryptographie (2002) - Arnault F.djvu
|
1.0 MB
|
Статьи по криптографии - Сидельников В.М.djvu
|
992.0 KB
|
Лекции по арифметическим алгоритмам в криптографии (2002) - Черемушкин.PDF
|
790.4 KB
|
Алгоритмические основы элиптической криптографии - Болотов,Горшков,Фролов,Часовских.pdf
|
711.4 KB
|
Cracking DES Secrets of Encryption Research, Wiretap Politics, and Chip Design (1998).pdf
|
676.5 KB
|
Кpиптогpафия от папиpуса до компьютеpа (1996) - Жельников Владимиp.HTM
|
658.9 KB
|
Some Applications of coding theory in cryptography (2000) - Doumen,Jeroen.pdf
|
627.0 KB
|
Coding and Cryptography (1998) - Korner.pdf
|
517.7 KB
|
Elementary Number Theory (2003) - Clark W Edwin.pdf
|
463.4 KB
|
Основы современной криптографии - Баричев,Серов.djvu
|
457.4 KB
|
Криптография без секретов - Баричев.djvu
|
307.0 KB
|
Дискретная математика и криптология (2003) - Фомичёв.doc
|
293.9 KB
|
Введение в криптографию - Ростовцев.doc
|
268.3 KB
|
Generating a Product of Three Primes with an Unknown Factorization.pdf
|
260.2 KB
|
/Base/Манулы/
|
Асимметричный криптографический алгоритм на базе Конечно-Автоматной Модели, Сохраняющей Информацию.doc
|
3.3 MB
|
Асимметричный криптографический алгоритм на базе Конечно-Автоматной Модели, Сохраняющей Информацию.pdf
|
1.4 MB
|
Однонаправленная функция с «секретом» на базе КАМСИ.pdf
|
820.2 KB
|
Алгоритмический подход к квантовой физике.pdf
|
559.5 KB
|
Проблема аутентификации данных и блочные шифры - Винокуров.DOC
|
534.5 KB
|
О корреляционно-имунных и устойчивых булевых функциях.pdf
|
484.8 KB
|
Construction of a pseudo-random generator from any one-way function.pdf
|
351.7 KB
|
Методика комплексной оценки рисков утечки информации в корпо.doc
|
159.7 KB
|
Основные тенденции развития открытой криптографии.rar
|
97.0 KB
|
/Base/Программирование/
|
net security and cryptography (2003) - Peter Thorsteinson, G. Gnana Arun Ganesh.pdf
|
11.6 MB
|
Introduction to Cryptography with Java Applets - Jones & Bartlett Publishers.pdf
|
10.2 MB
|
An Introduction to Cryptography (2nd ed.) - Mollin R.pdf
|
4.0 MB
|
Теория и практика защиты программ - Казарин О.В.pdf
|
4.0 MB
|
net security and cryptography (2003) - Peter Thorsteinson, G. Gnana Arun Ganesh.chm
|
3.3 MB
|
Programming .NET Security (2003) - Freeman,Jones.chm
|
2.8 MB
|
Beginning Cryptography With Java (2005).chm
|
2.6 MB
|
Java Cryptography - Knudsen.pdf
|
1.5 MB
|
Secure Programming Cookbook for C and C++ (2003) - Messier,Viega.chm
|
1.4 MB
|
The laws of cryptography with Java code (2003) - Wagner.ZIP
|
993.2 KB
|
Oracle Cryptographic Toolkit Programmer's Guide 2.0.4.pdf
|
964.8 KB
|
Java Cryptography (Examples).zip
|
146.8 KB
|
/Base/
|
Исходники.rar
|
73.3 MB
|
Статьи.rar
|
26.5 MB
|
Словари.rar
|
1.1 MB
|
Ссылки.rar
|
633.9 KB
|
/SOFT/
|
AR32E30.ZIP
|
3.9 MB
|
/
|
КАТАЛОГ.doc
|
122.2 KB
|
Total files 258
|