FileMood

Download КРИПТОГРАФИЯ

КРИПТОГРАФИЯ

Name

КРИПТОГРАФИЯ

 DOWNLOAD Copy Link

Total Size

1.8 GB

Total Files

258

Hash

9E5D50CAC22969877163935488117972B228F61D

/#1 ussue - 19.07.2010/

[21] Cryptography and Security Services Mechanisms and Applications - Cybertech Publishing, 2008.pdf

63.3 MB

[29] Introduction to Automata Theory, Languages, and Computation (2nd Edition) - Addison Wesley, 2000.pdf

59.4 MB

[35] Practical Cryptology and Web Security - Pearson Education, 2005.pdf

26.4 MB

[30] Mathematical Foundations of Computer Science 2008 - 33rd International Symposium, MFCS 2008, Torun, Poland, August 25-29, 2008, Proceedings - Springer, 2008.pdf

22.1 MB

[04] An Introduction to Formal Languages and Automata - Jones and Bartlett Publishers, 2000.pdf

22.0 MB

[11] CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One) - McGraw-Hill, 2007.pdf

21.8 MB

07 - Криптография на С и С++ в действии. Учебное пособие - Вельшенбах, 2004.djvu

20.8 MB

[22] Disappearing cryptography second edition information hiding steganography and watermarking - Morgan Kaufmann Publishers, 2002.pdf

19.8 MB

[06] Applied Cryptanalysis Breaking Ciphers in the Real World - John Wiley & Sons, 2007.pdf

19.6 MB

[03] Advances in Cryptology - Crypto 2004 24th Annual International Cryptology Conference, Santa Barbara, California - Springer, 2005.pdf

19.6 MB

[16] Cryptographic Hardware and Embedded Systems - CHES 2004 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings - Springer, 2005.pdf

19.3 MB

10 - Современная криптография. Теория и практика - Венбо Мао, 2005.djvu

19.3 MB

[09] CCNA Security Course Booklet, Version 1.0 - Cisco Press, 2009.pdf

18.0 MB

[17] Cryptographic Hardware and Embedded Systems - CHES 2005 7th International Workshop - Springer, 2005.pdf

17.7 MB

[31] Mechanics of User Identification and Authentication- Fundamentals of Identity Management - Auerbach Publications, 2007.pdf

17.5 MB

09 - Практическая криптография - Фергюсон, 2005.djvu

17.4 MB

[10] CCNA Security Lab Manual - Cisco Press, 2009.pdf

16.8 MB

[15] Cryptographic Hardware and Embedded Systems - CHES 2002 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002 - Springer, 2003.pdf

16.7 MB

[27] Hardware-based Computer Security Techniques to Defeat Hackers- From Biometrics to Quantum Cryptography - John Wiley & Sons, 2008.pdf

15.4 MB

11 - Элементарное введение в элептическую криптографию - Болотов А.А. и др., 2006.djvu

15.3 MB

[26] Handbook of Remote Biometrics- for Surveillance and Security (Advances in Pattern Recognition) - Springer, 2009.pdf

14.1 MB

[18] Cryptography and Network Security (4th Edition) - Prentice Hall, 2005.chm

13.0 MB

[14] Cryptanalysis - Dover Publications, 1989.pdf

12.6 MB

[19] Cryptography and Public Key Infrastructure on the Internet - John Wiley & Sons, 2001.pdf

12.6 MB

04 - Компьютерные сети - Таненбаум, 2003.djvu

10.6 MB

[13] Comptia security 2008 in depth - Course technology, 2009.pdf

10.2 MB

[12] CompTIA Security+ All-in-One Exam Guide, Second Edition - McGraw-Hill, 2008.pdf

9.7 MB

07 - Криптография на С и С++ в действии. Учебное пособие - Вельшенбах, 2004 (CD-DISK).rar

9.5 MB

[01] A Classical Introduction to Cryptography Exercise Book - Springer, 2005.pdf

9.4 MB

05 - Криптография. Мир программирования - Смарт, 2005.pdf

8.8 MB

[32] Multimedia Content Encryption - Techniques and Applications - Auerbach Publications, 2008.pdf

8.7 MB

03 - Дискретная математика и комбинаторика - Андерсон, 2004.djvu

8.3 MB

08 - Основы современной криптографии для специалистов в информационных технологиях - Рябко, Фионов, 2004.djvu

8.0 MB

02 - Алгоритмы шифрования.Справочник. - Панасенко, 2009.djvu

7.8 MB

[05] An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics) - Springer, 2008.pdf

7.7 MB

[41] Understanding Cryptography A Textbook for Students and Practitioners - Springer, 2009.pdf

7.1 MB

[36] Quantum Optics (Oxford Graduate Texts) - Oxford University Press, 2008.pdf

7.0 MB

[28] Innovative Cryptography (Programming Series) - Charles River, 2006.pdf

6.9 MB

[39] Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings - Springer, 2008.pdf

5.9 MB

[24] Error Correcting Coding and Security for Data Networks - Analysis of the Superchannel Concept - John Wiley & Sons, 2005.pdf

5.1 MB

[20] Cryptography and security services mechanisms and applications - Cybertech Publishing, 2007.pdf

5.0 MB

[23] Disappearing cryptography third edition information hiding steganography watermarking - Morgan Kaufmann Publishers, 2009.pdf

5.0 MB

[33] Pairing-Based Cryptography Pairing 2008 - Second International Conference, Egham, UK, September 1-3, 2008, Proceedings (Lecture Notes in Computer Science) - Springer, 2008.pdf

4.6 MB

[25] Finite Automata and Application to Cryptography - Springer, 2009.pdf

3.5 MB

[08] Basics of Contemporary Cryptography for IT Practitioners - World Scientific Publishing, 2005.pdf

3.3 MB

[38] Secure multi-party non-repudiation protocols and applications advances in information security - Springer, 2009.pdf

3.2 MB

[34] Post Quantum Cryptography - Springer, 2008.pdf

2.4 MB

[02] Advanced Encryption Standard - AES 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004 - Springer, 2005.pdf

2.2 MB

[37] Secure key establishment advances in information security - Springer, 2009.pdf

1.9 MB

[07] Automata Theory with Modern Applications - Cambridge University Press, 2006.pdf

1.6 MB

06 - Криптография и теория кодирования - Сидельников.djvu

1.5 MB

01 - 25 этюдов о шифрах - С.А.Дориченко, 1994.djvu

1.0 MB

[40] The Twofish Encryption Algorithm A 128-Bit Block Cipher - John Wiley & Sons, 1999.chm

635.1 KB

/Articles/

Quantum Cryptography. Public key distribution and coin tossing - C. H. Bennett and G. Brassard (1984).pdf

1.9 MB

Side Channel Cryptanalysis of a High Order Masking Scheme - J.S. Coron and E. Prouff and M. Rivain (Proceedings of CHES 2007, LNCS, 2007).pdf

1.5 MB

Quantum Cryptography. A study into the present technologies and future applications - Bill Grindlay (2003).pdf

928.2 KB

Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform - J.S. Coron, C. Giraud etc (Proceedings of CHES 2008, LNCS, 2008).pdf

563.8 KB

Quantum Cryptography Based on Bell's Theorem - Artur K. Ekert (1991).pdf

467.1 KB

Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages - J.S. Coron, H. Handschuh etc (Proceedings of PKC '02, Lecture Notes in Computer Science, Springer-Verlag, 2002).pdf

425.1 KB

Optimal security proofs for PSS and other signature schemes - J.S. Coron (Proceedings of Eurocrypt '02, Lecture Notes in Computer Science, Springer-Verlag, 2002).pdf

385.3 KB

Efficient Indifferentiable Hashing into Ordinary Elliptic Curves - E. Brier, J.S. Coron (Proceedings of CRYPTO 2010, LNCS, 2010).pdf

371.7 KB

An Efficient Method for Random Delay Generation in Embedded Software - J.S. Coron and I. Kizhvatov (Proceedings of CHES 2009, LNCS, 2009).pdf

361.6 KB

Practical Cryptanalysis of ISO - IEC 9796-2 and EMV Signatures - J.S. Coron, D. Naccache etc (Proceedings of Crypto 2009, LNCS, 2009).pdf

342.3 KB

On the security of RSA padding - J.S. Coron, D. Naccache and J.P. Stern (Proceedings of Crypto '99, Lecture Notes in Computer Science, Springer-Verlag, 1999).pdf

327.6 KB

Cryptanalysis of ISO-IEC 9796-1 - Don Coppersmith, Jean-Sebastien Coron etc (Journal of Cryptology, Volume 21, Number 1, 2008).pdf

322.6 KB

An accurate evaluation of maurer's universal test - J.S. Coron and D. Naccache (Proceedings of SAC'98, Lecture Notes in Computer Science, Springer-Verlag, 1998 ).pdf

320.1 KB

A Domain Extender for the Ideal Cipher - J.S. Coron, Y. Dodis, A. Mandal and Y. Seurin (Proceedings of TCC 2010, LNCS, 2010).pdf

317.0 KB

The Random Oracle Model and the Ideal Cipher Model are Equivalent - J.S. Coron, J. Patarin and Y. Seurin (Proceedings of Crypto 2008, LNCS, 2008).pdf

308.0 KB

GEM. a Generic Chosen-Ciphertext Secure Encryption Method - J.S. Coron, H. Handschuh etc (Proceedings of CT-RSA '02, Lecture Notes in Computer Science, Springer-Verlag, 2002).pdf

297.1 KB

Universal padding schemes for RSA - J.S. Coron, M. Joye, D. Naccache and P. Paillier (Proceedings of Crypto '02, Lecture Notes in Computer Science, Springer-Verlag, 2002).pdf

288.7 KB

New attacks on PKCS#1 v1.5 encryption - J.S. Coron, D. Naccache, M. Joye and P. Paillier (Proceedings of Eurocrypt '00, Lecture Notes in Computer Science, Springer-Verlag, 2000).pdf

271.0 KB

Fault Attacks on RSA Signatures with Partially Unknown Messages - J.S. Coron, A. Joux etc (Proceedings of CHES 2009, LNCS, 2009).pdf

264.2 KB

On the security of random sources - J.S. Coron (Proceedings of PKC '99, Lecture Notes in Computer Science, Springer-Verlag, 1999).pdf

245.0 KB

Security analysis of the Gennaro-Halevi-Rabin signature scheme - J.S. Coron and D. Naccache (Proceedings of Eurocrypt '00, Lecture Notes in Computer Science, Springer-Verlag, 2000).pdf

236.4 KB

Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring - Jean-Sebastien Coron and Alexander May (Journal of Cryptology, Volume 20, Number 1, January 2007).pdf

235.1 KB

Merkle-Damgard Revisited- how to construct a hash-function - J.S. Coron, Y. Dodis (Proceedings of Crypto 2005, LNCS, 2005).pdf

235.0 KB

Resistance against Differential Power Analysis for elliptic curves cryptosystems - J.S. Coron (Proceedings of CHES '99, Lecture Notes in Computer Science, Springer-Verlag, 1999).pdf

229.6 KB

A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis - J.S. Coron, D. Lefranc and G. Poupard (Proceedings of CHES 2005, LNCS, 2005).pdf

226.3 KB

Finding collisions in the full SHA-1 - X. Wang and H. Yu (Crypto’05. Santa Barbara, CA, 2005).pdf

217.3 KB

Fault Attacks Against EMV Signatures - J.S. Coron, D. Naccache and M. Tibouchi (Proceedings of CT-RSA 2010, LNCS, 2010).pdf

204.8 KB

From fixed-length to arbitrary length RSA padding schemes - J.S. Coron, F. Koeune and D. Naccache (Proceedings of Asiacrypt '00, Lecture Notes in Computer Science, Springer-Verlag, 2000).pdf

200.1 KB

Analysis and Improvement of the Random Delay Countermeasure of CHES 2009 - J.S. Coron and I. Kizhvatov (Proceedings of CHES 2010, LNCS, 2010).pdf

198.6 KB

PSS is Secure against Random Fault Attacks - J.S. Coron and A. Mandal (Proceedings of ASIACRYPT 2009, LNCS, 2009).pdf

181.1 KB

On the exact security of Full Domain Hash - J.S. Coron (Proceedings of Crypto '00, Lecture Notes in Computer Science, Springer-Verlag, 2000).pdf

178.6 KB

On Boolean and Arithmetic Masking against Differential Power Analysis - J.S. Coron and L. Goubin (Proceedings of CHES '00, Lecture Notes in Computer Science, Springer-Verlag, 2000).pdf

162.9 KB

Finding small roots of bivariate integer equations revisited - J.S. Coron (Proceedings of Eurocrypt 2004, LNCS, 2004).pdf

162.9 KB

Finding Small Roots of Bivariate Integer Polynomial Equations - a Direct Approach - J.S. Coron (Proceedings of Crypto 2007, LNCS, 2007).pdf

161.3 KB

A New DPA Countermeasure Based on Permutation Tables - J.S. Coron (Proceedings of SCN 2008, LNCS, 2008).pdf

157.3 KB

Index Calculation Attacks on RSA Signature and Encryption - J.S. Coron, Y. Desmedt etc (Des. Codes Cryptography, vol. 38, Number 1, January, 2006).pdf

152.3 KB

Cryptanalysis of RSA signatures with fixed pattern padding - E. Brier, C. Clavier (Proceedings of Crypto '01, Lecture Notes in Computer Science, Springer-Verlag, 2001).pdf

150.1 KB

A New Algorithm for Switching from Arithmetic to Boolean Masking -J.S. Coron and A. Tchulkine (Proceedings of CHES '03, Lecture Notes in Computer Science, Springer-Verlag, 2003).pdf

116.5 KB

Boneh et al's k-Element Aggregate Extraction Assumption Is Equivalent to The Diffie-Hellman Assumption - J.S. Coron and D. Naccache (Proceedings of Asiacrypt '03, Lecture Notes in Computer Science, Springer-Verlag, 2003).pdf

114.9 KB

On the Implementation of a Fast Prime Generation Algorithm - C. Clavier and J.S. Coron (Proceedings of CHES 2007, LNCS, 2007).pdf

109.9 KB

Cryptanalysis of a Provably Secure CRTRSA - David Wagner (University of California at Berkeley) article.pdf

109.0 KB

Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95 - J.S. Coron and D. Naccache (Proceedings of CT-RSA 2004, Lecture Notes in Computer Science, Springer-Verlag, 2004).pdf

87.2 KB

/#2 ussue - 08.08.2010/

[28] Malicious Cryptography. Exposing Cryptovirology - Adam Young, Moti Yung (Wiley, 2004).pdf

30.5 MB

[24] Introduction to Cryptography - Johannes Buchmann (Springer, 2000).pdf

29.7 MB

[41] The Mathematics of Ciphers - Number Theory and RSA Cryptography - S. C. Coutinho (AK Peters, Ltd, 1998).pdf

24.2 MB

12 - Основы Криптологии. Профессиональное руководство и интерактивный учебник - Х.К.А.ван Тилборг (МИР, 2006).pdf

22.7 MB

11 - Основы криптографии - А. П. Алферов, А. Ю. Зубов, А. С. Кузьмин, А. В. Черемушкин (Гелиос АРВ, 2005).djvu

19.6 MB

03 - Булевы функции в теории кодирования и криптологии -.О. А. Логачев, А. А. Сальников, В. В. Ященко (МЦНМО,2 004).djvu

19.1 MB

[13] Cryptographic Engineering - Cetin Kaya Koc (Springer, 2008).pdf

17.6 MB

[12] Cryptographic Algorithms on Reconfigurable Hardware (Signals and Communication Technology) - Francisco Rodriguez-Henriquez, N.A. Saqib, A. Diaz-Perez, Cetin Kaya Koc (Springer, 2006).pdf

16.6 MB

[44] User's Guide To Cryptography And Standards - Alex W. Dent, Chris J. Mitchell (Artech House, 2004).pdf

14.9 MB

09 - Математические основы криптологии - Ю. С. Харин, В. И. Берник и т.д. (БГУ, 1999).djvu

13.9 MB

05 - Дискретная математика и криптология. Курс лекций - В. М. Фомичев (Диалог-МИФИ, 2003).djvu

13.6 MB

[19] Decrypted Secrets. Methods and Maxims of Cryptology - Friedrich L. Bauer (Springer, 4th ed. edition, 2006).pdf

12.9 MB

[21] Elliptic Curves - Number Theory and Cryptography, Second Edition - Lawrence C. Washington (Chapman & Hall or CRC, 2008).rar

10.8 MB

10 - Основы кодирования - М. Вернер (Техносфера, 2004).pdf

9.9 MB

[36] RSA Security's Official Guide to Cryptography - Steve Burnett, Stephen Paine (McGraw-Hill Osborne Media, 2001).pdf

9.6 MB

08 - Криптографические методы защиты информации - Рябко Б.Я., Фионов А.Н ()Горячая Линия - Телеком, 2005.djvu

9.5 MB

[10] Cracking Codes and Cryptograms For Dummies - Denise Sutherland, Mark Koltko-Rivera (For Dummies, 2009).pdf

9.4 MB

[08] Codes over Rings (Series on Coding Theory and Cryptology) - Patrick Solo (World Scientific Publishing Company, 2009).pdf

9.2 MB

[33] Quantum Computation and Quantum Information - Michael A. Nielsen (Cambridge University Press, 2000).djvu

7.8 MB

14 - Стандарт криптографической защиты - AES. Конечные поля - О. С. Зензин, М. А. Иванов (КУДИЦ-Образ, 2002).djvu

7.4 MB

07 - Компьютерная безопасность. Криптографические методы защиты - Петров А.А (2000).djvu

6.8 MB

17 - Элементы криптографии. Основы теории защиты информации - В. И. Нечаев (Высшая школа, 1999).djvu

6.2 MB

[23] Information Security. Fundamentals - John A. Blackley , Justin Peltier, Thomas R. Peltier (Auerbach Publications, 2003).pdf

6.1 MB

[32] Public Key Cryptography. PKC 2010 - Phong Q. Nguyen, David Pointcheval (Springer, 2010).pdf

5.8 MB

01 - Аутентификация. От паролей до открытых ключей - Ричард Э. Смит (Вильямс, 2002).djvu

5.7 MB

[30] Progress in Cryptology. Africacrypt 2010 - Daniel J. Bernstein, Tanja Lange (Springer, 2010).pdf

5.7 MB

[05] Codes- The Guide to Secrecy From Ancient to Modern Times - Richard A. Mollin (Chapman & Hall or CRC, 2005).pdf

5.7 MB

[40] The Cryptoclub - Using Mathematics to Make and Break Secret Codes - Janet Beissinger, Vera Pless (AK Peters Ltd, 2006).djvu

5.5 MB

[40] The Cryptoclub - Using Mathematics to Make and Break Secret Codes - WorkBook.pdf

5.3 MB

[14] Cryptography for Developers - Tom St Denis (Syngress Publishing, 2006).pdf

5.3 MB

[03] Applied Quantum Cryptography - Christian Kollmitzer, Mario Pivk (Springer, 2010).pdf

5.2 MB

[18] Cryptology Unlocked - Reinhard Wobst, Angelika Shafir (Wiley, 2007).pdf

4.9 MB

13 - Словарь криптографических терминов - Погорелов Б.А. (ред) (2006).pdf

4.8 MB

[42] The Physics Of Quantum Information Quantum Cryptography, Teleportation, Computation - Bouwmeester et al. (Springer, 2000).djvu

4.3 MB

[17] Cryptography in C and C++ - Michael Welschenbach (Apress, 2001).chm

3.7 MB

[07] Codes An Introduction to Information Communication and Cryptography - Norman L. Biggs (Springer, 2008).pdf

3.6 MB

[35] RSA and Public-Key Cryptography - Richard A. Mollin (Chapman & Hall or CRC, 2002).rar

3.5 MB

15 - Физика квантовой информации - Боумейстер.и.др (2002).djvu

3.5 MB

[38] The Code Book- The Science of Secrecy from Ancient Egypt to Quantum Cryptography - SIMON SINGH (Anchor , 2000).pdf

3.0 MB

[27] Learn Encryption Techniques with Basic And C++ - Gilbert Held (Wordware Publishing, 1998).chm

2.9 MB

[02] Algorithmic Cryptanalysis - Antoine Joux (Chapman & Hall or CRC, 2009).pdf

2.8 MB

16 - Элементарное введение в эллиптическую криптографию. Алгебраические и алгоритмические основы - Болотов А.А., Гашков С.Б., Фролов А.Б (КомКнига, 2006).pdf

2.6 MB

[26] Kryptologie- Algebraische Methoden und Algorithmen - Christan Karpfinger, Hubert Kiechle (Vieweg+Teubner Verlag, 2009) German.pdf

2.4 MB

06 - Защита информации в компьютерных системах и сетях - Ю. В. Романец, П. А. Тимофеев, В. Ф. Шаньгин (Радио и связь, 2001).djvu

2.3 MB

[04] Brute Force - Cracking the Data Encryption Standard - Matt Curtin (Springer, 2005).pdf

2.2 MB

[16] Cryptography in C and C++, Second Edition - Michael Welschenbach (Apress, 2005).pdf

2.2 MB

[09] Coding and Cryptology - Yongqing Li, San Ling, Harald NiederreiterHuaxiong (World Scientific Publishing Company, 2008).pdf

2.2 MB

[22] Elliptic Curves and Their Applications to Cryptography. An Introduction - Andreas Enge (Springer, 1999).pdf

2.0 MB

[20] Digital Signatures (Advances in Information Security) - Jonathan Katz (Springer, 2010).pdf

1.8 MB

[06] Codes and Cryptography - Dominic Welsh (Oxford University Press, 1998).djvu

1.8 MB

[39] The Codebreakers. The Story of Secret Writing - David Kahn (Macmillan Pub Co, 1974).pdf

1.8 MB

[25] Kerberos- The Definitive GuideKerberos - Jason Garman (O'Reilly 2003).chm

1.5 MB

[34] Quantum Cryptography - N. Gisin, G. Ribordy, W. Tittel, H. Zbinden (arXiv, 2001).pdf

1.4 MB

[37] ]SSL & TLS Essentials. Securing the Web free - Stephen A. Thomas (Wiley, 2000).pdf

1.4 MB

[15] Cryptography for Internet & Database Applications - Nick Galbreath, Nicholas Galbreath (Wiley, 2002).pdf

1.4 MB

12 - Основы Криптологии. Профессиональное руководство и интерактивный учебник - CD-DISK.rar

1.4 MB

[43] Understanding PKI. Concepts, Standards, and Deployment Considerations. Second Edition - Carlisle Adams, Steve Lloyd (Addison Wesley, 2002).chm

1.2 MB

[31] Protecting Information. From Classical Error Correction to Quantum Cryptography - Loepp,Wootters (Cambridge University Press, 2006).pdf

1.0 MB

04 - Взломщики кодов - Дэвид Кан (Центрполиграф, 2000).rtf

992.5 KB

[01] A brief introduction of quantum cryptography for engineers - Bing Qi, Li Qian, Hoi-Kwong Lo (arXiv, 2010).pdf

651.0 KB

[11] CRYPTANALYSIS OF RSA USING ALGEBRAIC AND LATTICE METHODS - Glenn Durfee (2002) a dissertation.pdf

570.7 KB

02 - Булева алгебра, комбинационные схемы, преобразования двоичных последовательностей - И. Л. Ерош (СПб. ГУАП, 2001).pdf

300.1 KB

[29] Number Theory and related Algorithms in Cryptography - Alireza Nemaney Pour,2002.pdf

256.1 KB

/Base/Квантовая крипто/Статьи/

Quantum key distribution over 67 km with a plug&play system.pdf

439.3 KB

Квантовая криптография- основы разработки и информационное обеспечение.pdf

202.1 KB

О одном подходе к построению квантовых кодов II.pdf

188.4 KB

О одном подходе к построению квантовых кодов.pdf

184.5 KB

Алгоритм выработки общего ключа с помощью квантового канала связи.pdf

163.5 KB

Квантовая криптография- дорогая игрушка или технология будущего - Винокуров.doc

123.9 KB

Квантовая криптография - Красавин.doc

100.4 KB

Квантовая криптография - Семенов.doc

99.8 KB

О НЕСТОЙКОСТИ КВАНТОВОЙ КРИПТОГРАФИИ - Горшков.doc

24.6 KB

Что не так с классической криптографией.mht

20.1 KB

/Base/Квантовая крипто/

Quantum cryptography (2002) - group of applied phyzics.pdf

1.9 MB

Quantum cryptography (2004) - group of applied phyzics.pdf

1.4 MB

A Quantum Leap for Cryptography.pdf

669.2 KB

Quantum Information Theory and Applications to Quantum Cryptography - Nikolaos P. Papadakos.pdf

409.8 KB

A quick glance at quantum cryptography - Lomonaco S. J.djvu

383.8 KB

Plug and Play quantum cryptography.pdf

155.9 KB

/Base/Криптография/

Dr.Dobb's essential books on cryptography and security (1997).rar

252.0 MB

Работы по теории информации и кибернетике (1963) - Шеннон.pdf

39.7 MB

Fundamentals of cryptology. A professional reference and interactive tutorial.pdf

31.1 MB

Cryptographic Hardware and Embedded Systems (2005) - Springer.pdf

19.3 MB

Modern Cryptography Theory and Practice (2003) - By Wenbo Mao.pdf

18.7 MB

Cryptography Theory And Practice - Douglas Stinson.chm

15.2 MB

A Computational Introduction To Number Theory And Algebra (2005) - Cambridge University Press.pdf

14.0 MB

Modern Cryptography Protect Your Data with Fast Block Ciphers (2003) -Goots,Izotov,Moldovyan,Moldovya.chm

12.1 MB

Теоретическая криптография - Ростовцев А.Г., Маховенко Е.Б.djvu

10.0 MB

Contemporary Cryptography (2005) - Artech House.pdf

8.0 MB

Handbook of applied cryptography (1997) - Menezes A., van Oorschot P., Vanstone S.djvu

6.6 MB

Прикладная криптография. Использование и синтез криптографических интерфейсов - Щербаков Л.Ю., Домашев А.В.djvu

5.5 MB

Progress On Cryptography. 25 Years Of Cryptography In China (2003) - Kluwer Academic Pub.pdf

5.2 MB

Advances in Elliptic Curve Cryptography (2005) - Cambridge University Press.pdf

4.9 MB

Guide to Elliptic Curve Cryptography - D. Hankerson, A. Menezes, S. Vanstone.pdf

4.6 MB

Cryptography For Dummies (2004) - Cobb.chm

4.2 MB

Cryptographie - Stinson (france).djvu

4.1 MB

Анализ и синтез криптоалгоритмов (2000) - Грушо,Применко,Тимонина.pdf

4.0 MB

Cryptography.An introduction to computer security.1989 - Sebery J.pdf

3.9 MB

Internet Security. Cryptographic Principles, Algorithms And Protocols (2003) - Man Young Rhee.pdf

3.8 MB

Прикладная криптография - Шнайер Б..pdf

3.5 MB

Complexity and Cryptography An Introduction (2006) - Cambridge University Press.pdf

3.4 MB

A Course In Number Theory And Cryptography (2nd ed.) - Koblitz Neal.djvu

3.4 MB

Applied Cryptography SE Protocols, Algorthms, and Source Code in C (1996) - Bruce Schneier.pdf

3.1 MB

A Computational Introduction To Number Theory and Algebra (2004) - Victor Shoup.pdf

3.0 MB

Ведение в теорию чисел. Алгоритм RSA (2001) - Коутинхо.djvu

2.8 MB

Cryptographic Security. Architecture, Design and Verification - Springer.pdf

2.8 MB

Поточные шифры. Результаты зарубежной открытой криптологии (1997).rar

2.7 MB

BigNum Math. Implementing Cryptographic Multiple Precision Arithmetic (2006) - Denis T., Rose G.djvu

2.5 MB

Теоретико-числовые алгоритмы в криптографии (2003) - Василенко.PDF

2.5 MB

Приложение теории детерминированного хаоса в криптографии (2002) - Птицын.pdf

2.3 MB

Курс теории чисел и криптографии (2001) - Коблиц.djvu

2.3 MB

Lecture Notes on Cryptography (2001) - Goldwasser S., Belare M.pdf

2.0 MB

Основы технологии PKI (2004) - Горбатов B.C., Полянская О.Ю.pdf

2.0 MB

Введение в криптографию - Ященко.djvu

1.8 MB

Криптография с открытым ключом (1995) - Салоома.djvu

1.6 MB

Современная криптология (1999) - Брассар.djvu

1.6 MB

Foundations of Cryptography.pdf

1.5 MB

Основы криптографических алгоритмов (2002) - Гатчин о.Р., Коробейников А.Г.pdf

1.5 MB

Cryptography. A Very Short Intro (2002) - Piper,Murphy.chm

1.4 MB

Codes and Ciphers. Julius Caesar the Enigma and the Internet (2004) - Cambridge University Press.pdf

1.3 MB

Совершенные шифры (2003) - Зубов.rar

1.2 MB

Криптография и компьютерная безопасность - Файстель Х..pdf

1.1 MB

Theorie des nombres et cryptographie (2002) - Arnault F.djvu

1.0 MB

Статьи по криптографии - Сидельников В.М.djvu

992.0 KB

Лекции по арифметическим алгоритмам в криптографии (2002) - Черемушкин.PDF

790.4 KB

Алгоритмические основы элиптической криптографии - Болотов,Горшков,Фролов,Часовских.pdf

711.4 KB

Cracking DES Secrets of Encryption Research, Wiretap Politics, and Chip Design (1998).pdf

676.5 KB

Кpиптогpафия от папиpуса до компьютеpа (1996) - Жельников Владимиp.HTM

658.9 KB

Some Applications of coding theory in cryptography (2000) - Doumen,Jeroen.pdf

627.0 KB

Coding and Cryptography (1998) - Korner.pdf

517.7 KB

Elementary Number Theory (2003) - Clark W Edwin.pdf

463.4 KB

Основы современной криптографии - Баричев,Серов.djvu

457.4 KB

Криптография без секретов - Баричев.djvu

307.0 KB

Дискретная математика и криптология (2003) - Фомичёв.doc

293.9 KB

Введение в криптографию - Ростовцев.doc

268.3 KB

Generating a Product of Three Primes with an Unknown Factorization.pdf

260.2 KB

/Base/Манулы/

Асимметричный криптографический алгоритм на базе Конечно-Автоматной Модели, Сохраняющей Информацию.doc

3.3 MB

Асимметричный криптографический алгоритм на базе Конечно-Автоматной Модели, Сохраняющей Информацию.pdf

1.4 MB

Однонаправленная функция с «секретом» на базе КАМСИ.pdf

820.2 KB

Алгоритмический подход к квантовой физике.pdf

559.5 KB

Проблема аутентификации данных и блочные шифры - Винокуров.DOC

534.5 KB

О корреляционно-имунных и устойчивых булевых функциях.pdf

484.8 KB

Construction of a pseudo-random generator from any one-way function.pdf

351.7 KB

Методика комплексной оценки рисков утечки информации в корпо.doc

159.7 KB

Основные тенденции развития открытой криптографии.rar

97.0 KB

/Base/Программирование/

net security and cryptography (2003) - Peter Thorsteinson, G. Gnana Arun Ganesh.pdf

11.6 MB

Introduction to Cryptography with Java Applets - Jones & Bartlett Publishers.pdf

10.2 MB

An Introduction to Cryptography (2nd ed.) - Mollin R.pdf

4.0 MB

Теория и практика защиты программ - Казарин О.В.pdf

4.0 MB

net security and cryptography (2003) - Peter Thorsteinson, G. Gnana Arun Ganesh.chm

3.3 MB

Programming .NET Security (2003) - Freeman,Jones.chm

2.8 MB

Beginning Cryptography With Java (2005).chm

2.6 MB

Java Cryptography - Knudsen.pdf

1.5 MB

Secure Programming Cookbook for C and C++ (2003) - Messier,Viega.chm

1.4 MB

The laws of cryptography with Java code (2003) - Wagner.ZIP

993.2 KB

Oracle Cryptographic Toolkit Programmer's Guide 2.0.4.pdf

964.8 KB

Java Cryptography (Examples).zip

146.8 KB

/Base/

Исходники.rar

73.3 MB

Статьи.rar

26.5 MB

Словари.rar

1.1 MB

Ссылки.rar

633.9 KB

/SOFT/

AR32E30.ZIP

3.9 MB

/

КАТАЛОГ.doc

122.2 KB

 

Total files 258


Copyright © 2024 FileMood.com