FileMood

Download КРИПТОГРАФИЯ

КРИПТОГРАФИЯ

Name

КРИПТОГРАФИЯ

 DOWNLOAD Copy Link

Total Size

2.1 GB

Total Files

2083

Hash

E886A5E33803F908A3C0554019C9A3B7C322DDFE

/#1 ussue - 19.07.2010/

[21] Cryptography and Security Services Mechanisms and Applications - Cybertech Publishing, 2008.pdf

63.3 MB

[29] Introduction to Automata Theory, Languages, and Computation (2nd Edition) - Addison Wesley, 2000.pdf

59.4 MB

[35] Practical Cryptology and Web Security - Pearson Education, 2005.pdf

26.4 MB

[30] Mathematical Foundations of Computer Science 2008 - 33rd International Symposium, MFCS 2008, Torun, Poland, August 25-29, 2008, Proceedings - Springer, 2008.pdf

22.1 MB

[04] An Introduction to Formal Languages and Automata - Jones and Bartlett Publishers, 2000.pdf

22.0 MB

[11] CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One) - McGraw-Hill, 2007.pdf

21.8 MB

07 - Криптография на С и С++ в действии. Учебное пособие - Вельшенбах, 2004.djvu

20.8 MB

[22] Disappearing cryptography second edition information hiding steganography and watermarking - Morgan Kaufmann Publishers, 2002.pdf

19.8 MB

[06] Applied Cryptanalysis Breaking Ciphers in the Real World - John Wiley & Sons, 2007.pdf

19.6 MB

[03] Advances in Cryptology - Crypto 2004 24th Annual International Cryptology Conference, Santa Barbara, California - Springer, 2005.pdf

19.6 MB

[16] Cryptographic Hardware and Embedded Systems - CHES 2004 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings - Springer, 2005.pdf

19.3 MB

10 - Современная криптография. Теория и практика - Венбо Мао, 2005.djvu

19.3 MB

[09] CCNA Security Course Booklet, Version 1.0 - Cisco Press, 2009.pdf

18.0 MB

[17] Cryptographic Hardware and Embedded Systems - CHES 2005 7th International Workshop - Springer, 2005.pdf

17.7 MB

[31] Mechanics of User Identification and Authentication- Fundamentals of Identity Management - Auerbach Publications, 2007.pdf

17.5 MB

09 - Практическая криптография - Фергюсон, 2005.djvu

17.4 MB

[10] CCNA Security Lab Manual - Cisco Press, 2009.pdf

16.8 MB

[15] Cryptographic Hardware and Embedded Systems - CHES 2002 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002 - Springer, 2003.pdf

16.7 MB

[27] Hardware-based Computer Security Techniques to Defeat Hackers- From Biometrics to Quantum Cryptography - John Wiley & Sons, 2008.pdf

15.4 MB

[26] Handbook of Remote Biometrics- for Surveillance and Security (Advances in Pattern Recognition) - Springer, 2009.pdf

14.1 MB

[18] Cryptography and Network Security (4th Edition) - Prentice Hall, 2005.chm

13.0 MB

[14] Cryptanalysis - Dover Publications, 1989.pdf

12.6 MB

[19] Cryptography and Public Key Infrastructure on the Internet - John Wiley & Sons, 2001.pdf

12.6 MB

04 - Компьютерные сети - Таненбаум, 2003.djvu

10.6 MB

[13] Comptia security 2008 in depth - Course technology, 2009.pdf

10.2 MB

[12] CompTIA Security+ All-in-One Exam Guide, Second Edition - McGraw-Hill, 2008.pdf

9.7 MB

07 - Криптография на С и С++ в действии. Учебное пособие - Вельшенбах, 2004 (CD-DISK).rar

9.5 MB

[01] A Classical Introduction to Cryptography Exercise Book - Springer, 2005.pdf

9.4 MB

05 - Криптография. Мир программирования - Смарт, 2005.pdf

8.8 MB

[32] Multimedia Content Encryption - Techniques and Applications - Auerbach Publications, 2008.pdf

8.7 MB

03 - Дискретная математика и комбинаторика - Андерсон, 2004.djvu

8.3 MB

08 - Основы современной криптографии для специалистов в информационных технологиях - Рябко, Фионов, 2004.djvu

8.0 MB

02 - Алгоритмы шифрования.Справочник. - Панасенко, 2009.djvu

7.8 MB

[05] An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics) - Springer, 2008.pdf

7.7 MB

[41] Understanding Cryptography A Textbook for Students and Practitioners - Springer, 2009.pdf

7.1 MB

[36] Quantum Optics (Oxford Graduate Texts) - Oxford University Press, 2008.pdf

7.0 MB

[28] Innovative Cryptography (Programming Series) - Charles River, 2006.pdf

6.9 MB

[39] Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings - Springer, 2008.pdf

5.9 MB

[24] Error Correcting Coding and Security for Data Networks - Analysis of the Superchannel Concept - John Wiley & Sons, 2005.pdf

5.1 MB

[20] Cryptography and security services mechanisms and applications - Cybertech Publishing, 2007.pdf

5.0 MB

[23] Disappearing cryptography third edition information hiding steganography watermarking - Morgan Kaufmann Publishers, 2009.pdf

5.0 MB

[33] Pairing-Based Cryptography Pairing 2008 - Second International Conference, Egham, UK, September 1-3, 2008, Proceedings (Lecture Notes in Computer Science) - Springer, 2008.pdf

4.6 MB

[25] Finite Automata and Application to Cryptography - Springer, 2009.pdf

3.5 MB

[08] Basics of Contemporary Cryptography for IT Practitioners - World Scientific Publishing, 2005.pdf

3.3 MB

[38] Secure multi-party non-repudiation protocols and applications advances in information security - Springer, 2009.pdf

3.2 MB

[34] Post Quantum Cryptography - Springer, 2008.pdf

2.4 MB

[02] Advanced Encryption Standard - AES 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004 - Springer, 2005.pdf

2.2 MB

[37] Secure key establishment advances in information security - Springer, 2009.pdf

1.9 MB

[07] Automata Theory with Modern Applications - Cambridge University Press, 2006.pdf

1.6 MB

06 - Криптография и теория кодирования - Сидельников.djvu

1.5 MB

01 - 25 этюдов о шифрах - С.А.Дориченко, 1994.djvu

1.0 MB

[40] The Twofish Encryption Algorithm A 128-Bit Block Cipher - John Wiley & Sons, 1999.chm

635.1 KB

/Articles/

Quantum Cryptography. Public key distribution and coin tossing - C. H. Bennett and G. Brassard (1984).pdf

1.9 MB

Side Channel Cryptanalysis of a High Order Masking Scheme - J.S. Coron and E. Prouff and M. Rivain (Proceedings of CHES 2007, LNCS, 2007).pdf

1.5 MB

Quantum Cryptography. A study into the present technologies and future applications - Bill Grindlay (2003).pdf

928.2 KB

Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform - J.S. Coron, C. Giraud etc (Proceedings of CHES 2008, LNCS, 2008).pdf

563.8 KB

Quantum Cryptography Based on Bell's Theorem - Artur K. Ekert (1991).pdf

467.1 KB

Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages - J.S. Coron, H. Handschuh etc (Proceedings of PKC '02, Lecture Notes in Computer Science, Springer-Verlag, 2002).pdf

425.1 KB

Optimal security proofs for PSS and other signature schemes - J.S. Coron (Proceedings of Eurocrypt '02, Lecture Notes in Computer Science, Springer-Verlag, 2002).pdf

385.3 KB

Efficient Indifferentiable Hashing into Ordinary Elliptic Curves - E. Brier, J.S. Coron (Proceedings of CRYPTO 2010, LNCS, 2010).pdf

371.7 KB

An Efficient Method for Random Delay Generation in Embedded Software - J.S. Coron and I. Kizhvatov (Proceedings of CHES 2009, LNCS, 2009).pdf

361.6 KB

Practical Cryptanalysis of ISO - IEC 9796-2 and EMV Signatures - J.S. Coron, D. Naccache etc (Proceedings of Crypto 2009, LNCS, 2009).pdf

342.3 KB

On the security of RSA padding - J.S. Coron, D. Naccache and J.P. Stern (Proceedings of Crypto '99, Lecture Notes in Computer Science, Springer-Verlag, 1999).pdf

327.6 KB

Cryptanalysis of ISO-IEC 9796-1 - Don Coppersmith, Jean-Sebastien Coron etc (Journal of Cryptology, Volume 21, Number 1, 2008).pdf

322.6 KB

An accurate evaluation of maurer's universal test - J.S. Coron and D. Naccache (Proceedings of SAC'98, Lecture Notes in Computer Science, Springer-Verlag, 1998 ).pdf

320.1 KB

A Domain Extender for the Ideal Cipher - J.S. Coron, Y. Dodis, A. Mandal and Y. Seurin (Proceedings of TCC 2010, LNCS, 2010).pdf

317.0 KB

The Random Oracle Model and the Ideal Cipher Model are Equivalent - J.S. Coron, J. Patarin and Y. Seurin (Proceedings of Crypto 2008, LNCS, 2008).pdf

308.0 KB

GEM. a Generic Chosen-Ciphertext Secure Encryption Method - J.S. Coron, H. Handschuh etc (Proceedings of CT-RSA '02, Lecture Notes in Computer Science, Springer-Verlag, 2002).pdf

297.1 KB

Universal padding schemes for RSA - J.S. Coron, M. Joye, D. Naccache and P. Paillier (Proceedings of Crypto '02, Lecture Notes in Computer Science, Springer-Verlag, 2002).pdf

288.7 KB

New attacks on PKCS#1 v1.5 encryption - J.S. Coron, D. Naccache, M. Joye and P. Paillier (Proceedings of Eurocrypt '00, Lecture Notes in Computer Science, Springer-Verlag, 2000).pdf

271.0 KB

Fault Attacks on RSA Signatures with Partially Unknown Messages - J.S. Coron, A. Joux etc (Proceedings of CHES 2009, LNCS, 2009).pdf

264.2 KB

On the security of random sources - J.S. Coron (Proceedings of PKC '99, Lecture Notes in Computer Science, Springer-Verlag, 1999).pdf

245.0 KB

Security analysis of the Gennaro-Halevi-Rabin signature scheme - J.S. Coron and D. Naccache (Proceedings of Eurocrypt '00, Lecture Notes in Computer Science, Springer-Verlag, 2000).pdf

236.4 KB

Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring - Jean-Sebastien Coron and Alexander May (Journal of Cryptology, Volume 20, Number 1, January 2007).pdf

235.1 KB

Merkle-Damgard Revisited- how to construct a hash-function - J.S. Coron, Y. Dodis (Proceedings of Crypto 2005, LNCS, 2005).pdf

235.0 KB

Resistance against Differential Power Analysis for elliptic curves cryptosystems - J.S. Coron (Proceedings of CHES '99, Lecture Notes in Computer Science, Springer-Verlag, 1999).pdf

229.6 KB

A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis - J.S. Coron, D. Lefranc and G. Poupard (Proceedings of CHES 2005, LNCS, 2005).pdf

226.3 KB

Finding collisions in the full SHA-1 - X. Wang and H. Yu (Crypto’05. Santa Barbara, CA, 2005).pdf

217.3 KB

Fault Attacks Against EMV Signatures - J.S. Coron, D. Naccache and M. Tibouchi (Proceedings of CT-RSA 2010, LNCS, 2010).pdf

204.8 KB

From fixed-length to arbitrary length RSA padding schemes - J.S. Coron, F. Koeune and D. Naccache (Proceedings of Asiacrypt '00, Lecture Notes in Computer Science, Springer-Verlag, 2000).pdf

200.1 KB

Analysis and Improvement of the Random Delay Countermeasure of CHES 2009 - J.S. Coron and I. Kizhvatov (Proceedings of CHES 2010, LNCS, 2010).pdf

198.6 KB

PSS is Secure against Random Fault Attacks - J.S. Coron and A. Mandal (Proceedings of ASIACRYPT 2009, LNCS, 2009).pdf

181.1 KB

On the exact security of Full Domain Hash - J.S. Coron (Proceedings of Crypto '00, Lecture Notes in Computer Science, Springer-Verlag, 2000).pdf

178.6 KB

On Boolean and Arithmetic Masking against Differential Power Analysis - J.S. Coron and L. Goubin (Proceedings of CHES '00, Lecture Notes in Computer Science, Springer-Verlag, 2000).pdf

162.9 KB

Finding small roots of bivariate integer equations revisited - J.S. Coron (Proceedings of Eurocrypt 2004, LNCS, 2004).pdf

162.9 KB

Finding Small Roots of Bivariate Integer Polynomial Equations - a Direct Approach - J.S. Coron (Proceedings of Crypto 2007, LNCS, 2007).pdf

161.3 KB

A New DPA Countermeasure Based on Permutation Tables - J.S. Coron (Proceedings of SCN 2008, LNCS, 2008).pdf

157.3 KB

Index Calculation Attacks on RSA Signature and Encryption - J.S. Coron, Y. Desmedt etc (Des. Codes Cryptography, vol. 38, Number 1, January, 2006).pdf

152.3 KB

Cryptanalysis of RSA signatures with fixed pattern padding - E. Brier, C. Clavier (Proceedings of Crypto '01, Lecture Notes in Computer Science, Springer-Verlag, 2001).pdf

150.1 KB

A New Algorithm for Switching from Arithmetic to Boolean Masking -J.S. Coron and A. Tchulkine (Proceedings of CHES '03, Lecture Notes in Computer Science, Springer-Verlag, 2003).pdf

116.5 KB

Boneh et al's k-Element Aggregate Extraction Assumption Is Equivalent to The Diffie-Hellman Assumption - J.S. Coron and D. Naccache (Proceedings of Asiacrypt '03, Lecture Notes in Computer Science, Springer-Verlag, 2003).pdf

114.9 KB

On the Implementation of a Fast Prime Generation Algorithm - C. Clavier and J.S. Coron (Proceedings of CHES 2007, LNCS, 2007).pdf

109.9 KB

Cryptanalysis of a Provably Secure CRTRSA - David Wagner (University of California at Berkeley) article.pdf

109.0 KB

Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95 - J.S. Coron and D. Naccache (Proceedings of CT-RSA 2004, Lecture Notes in Computer Science, Springer-Verlag, 2004).pdf

87.2 KB

/#2 ussue - 08.08.2010/

[28] Malicious Cryptography. Exposing Cryptovirology - Adam Young, Moti Yung (Wiley, 2004).pdf

30.5 MB

[24] Introduction to Cryptography - Johannes Buchmann (Springer, 2000).pdf

29.7 MB

[40] The Mathematics of Ciphers - Number Theory and RSA Cryptography - S. C. Coutinho (AK Peters, Ltd, 1998).pdf

24.2 MB

11 - Основы Криптологии. Профессиональное руководство и интерактивный учебник - Х.К.А.ван Тилборг (МИР, 2006).pdf

22.7 MB

10 - Основы криптографии - А. П. Алферов, А. Ю. Зубов, А. С. Кузьмин, А. В. Черемушкин (Гелиос АРВ, 2005).djvu

19.6 MB

03 - Булевы функции в теории кодирования и криптологии -.О. А. Логачев, А. А. Сальников, В. В. Ященко (МЦНМО,2 004).djvu

19.1 MB

[13] Cryptographic Engineering - Cetin Kaya Koc (Springer, 2008).pdf

17.6 MB

[12] Cryptographic Algorithms on Reconfigurable Hardware (Signals and Communication Technology) - Francisco Rodriguez-Henriquez, N.A. Saqib, A. Diaz-Perez, Cetin Kaya Koc (Springer, 2006).pdf

16.6 MB

[43] User's Guide To Cryptography And Standards - Alex W. Dent, Chris J. Mitchell (Artech House, 2004).pdf

14.9 MB

08 - Математические основы криптологии - Ю. С. Харин, В. И. Берник и т.д. (БГУ, 1999).djvu

13.9 MB

04 - Дискретная математика и криптология. Курс лекций - В. М. Фомичев (Диалог-МИФИ, 2003).djvu

13.6 MB

[19] Decrypted Secrets. Methods and Maxims of Cryptology - Friedrich L. Bauer (Springer, 4th ed. edition, 2006).pdf

12.9 MB

[21] Elliptic Curves - Number Theory and Cryptography, Second Edition - Lawrence C. Washington (Chapman & Hall or CRC, 2008).rar

10.8 MB

09 - Основы кодирования - М. Вернер (Техносфера, 2004).pdf

9.9 MB

[36] RSA Security's Official Guide to Cryptography - Steve Burnett, Stephen Paine (McGraw-Hill Osborne Media, 2001).pdf

9.6 MB

07 - Криптографические методы защиты информации - Рябко Б.Я., Фионов А.Н ()Горячая Линия - Телеком, 2005.djvu

9.5 MB

[10] Cracking Codes and Cryptograms For Dummies - Denise Sutherland, Mark Koltko-Rivera (For Dummies, 2009).pdf

9.4 MB

[08] Codes over Rings (Series on Coding Theory and Cryptology) - Patrick Solo (World Scientific Publishing Company, 2009).pdf

9.2 MB

[33] Quantum Computation and Quantum Information - Michael A. Nielsen (Cambridge University Press, 2000).djvu

7.8 MB

13 - Стандарт криптографической защиты - AES. Конечные поля - О. С. Зензин, М. А. Иванов (КУДИЦ-Образ, 2002).djvu

7.4 MB

06 - Компьютерная безопасность. Криптографические методы защиты - Петров А.А (2000).djvu

6.8 MB

15 - Элементы криптографии. Основы теории защиты информации - В. И. Нечаев (Высшая школа, 1999).djvu

6.2 MB

[23] Information Security. Fundamentals - John A. Blackley , Justin Peltier, Thomas R. Peltier (Auerbach Publications, 2003).pdf

6.1 MB

[32] Public Key Cryptography. PKC 2010 - Phong Q. Nguyen, David Pointcheval (Springer, 2010).pdf

5.8 MB

01 - Аутентификация. От паролей до открытых ключей - Ричард Э. Смит (Вильямс, 2002).djvu

5.7 MB

[30] Progress in Cryptology. Africacrypt 2010 - Daniel J. Bernstein, Tanja Lange (Springer, 2010).pdf

5.7 MB

[05] Codes- The Guide to Secrecy From Ancient to Modern Times - Richard A. Mollin (Chapman & Hall or CRC, 2005).pdf

5.7 MB

[39] The Cryptoclub - Using Mathematics to Make and Break Secret Codes - Janet Beissinger, Vera Pless (AK Peters Ltd, 2006).djvu

5.5 MB

[39] The Cryptoclub - Using Mathematics to Make and Break Secret Codes - WorkBook.pdf

5.3 MB

[14] Cryptography for Developers - Tom St Denis (Syngress Publishing, 2006).pdf

5.3 MB

[03] Applied Quantum Cryptography - Christian Kollmitzer, Mario Pivk (Springer, 2010).pdf

5.2 MB

[18] Cryptology Unlocked - Reinhard Wobst, Angelika Shafir (Wiley, 2007).pdf

4.9 MB

12 - Словарь криптографических терминов - Погорелов Б.А. (ред) (2006).pdf

4.8 MB

[41] The Physics Of Quantum Information Quantum Cryptography, Teleportation, Computation - Bouwmeester et al. (Springer, 2000).djvu

4.3 MB

[17] Cryptography in C and C++ - Michael Welschenbach (Apress, 2001).chm

3.7 MB

[07] Codes An Introduction to Information Communication and Cryptography - Norman L. Biggs (Springer, 2008).pdf

3.6 MB

[35] RSA and Public-Key Cryptography - Richard A. Mollin (Chapman & Hall or CRC, 2002).rar

3.5 MB

14 - Физика квантовой информации - Боумейстер.и.др (2002).djvu

3.5 MB

[38] The Code Book- The Science of Secrecy from Ancient Egypt to Quantum Cryptography - SIMON SINGH (Anchor , 2000).pdf

3.0 MB

[27] Learn Encryption Techniques with Basic And C++ - Gilbert Held (Wordware Publishing, 1998).chm

2.9 MB

[02] Algorithmic Cryptanalysis - Antoine Joux (Chapman & Hall or CRC, 2009).pdf

2.8 MB

[26] Kryptologie- Algebraische Methoden und Algorithmen - Christan Karpfinger, Hubert Kiechle (Vieweg+Teubner Verlag, 2009) German.pdf

2.4 MB

05 - Защита информации в компьютерных системах и сетях - Ю. В. Романец, П. А. Тимофеев, В. Ф. Шаньгин (Радио и связь, 2001).djvu

2.3 MB

[04] Brute Force - Cracking the Data Encryption Standard - Matt Curtin (Springer, 2005).pdf

2.2 MB

[16] Cryptography in C and C++, Second Edition - Michael Welschenbach (Apress, 2005).pdf

2.2 MB

[09] Coding and Cryptology - Yongqing Li, San Ling, Harald NiederreiterHuaxiong (World Scientific Publishing Company, 2008).pdf

2.2 MB

[22] Elliptic Curves and Their Applications to Cryptography. An Introduction - Andreas Enge (Springer, 1999).pdf

2.0 MB

[20] Digital Signatures (Advances in Information Security) - Jonathan Katz (Springer, 2010).pdf

1.8 MB

[06] Codes and Cryptography - Dominic Welsh (Oxford University Press, 1998).djvu

1.8 MB

[25] Kerberos- The Definitive GuideKerberos - Jason Garman (O'Reilly 2003).chm

1.5 MB

[34] Quantum Cryptography - N. Gisin, G. Ribordy, W. Tittel, H. Zbinden (arXiv, 2001).pdf

1.4 MB

[37] ]SSL & TLS Essentials. Securing the Web free - Stephen A. Thomas (Wiley, 2000).pdf

1.4 MB

[15] Cryptography for Internet & Database Applications - Nick Galbreath, Nicholas Galbreath (Wiley, 2002).pdf

1.4 MB

11 - Основы Криптологии. Профессиональное руководство и интерактивный учебник - CD-DISK.rar

1.4 MB

[42] Understanding PKI. Concepts, Standards, and Deployment Considerations. Second Edition - Carlisle Adams, Steve Lloyd (Addison Wesley, 2002).chm

1.2 MB

[31] Protecting Information. From Classical Error Correction to Quantum Cryptography - Loepp,Wootters (Cambridge University Press, 2006).pdf

1.0 MB

[01] A brief introduction of quantum cryptography for engineers - Bing Qi, Li Qian, Hoi-Kwong Lo (arXiv, 2010).pdf

651.0 KB

[11] CRYPTANALYSIS OF RSA USING ALGEBRAIC AND LATTICE METHODS - Glenn Durfee (2002) a dissertation.pdf

570.7 KB

02 - Булева алгебра, комбинационные схемы, преобразования двоичных последовательностей - И. Л. Ерош (СПб. ГУАП, 2001).pdf

300.1 KB

[29] Number Theory and related Algorithms in Cryptography - Alireza Nemaney Pour,2002.pdf

256.1 KB

/Articles/

Enterprise Cryptography for Enhanced Security – Sun Microsystems (2003).pdf

743.0 KB

Cryptanalysis in the German Air Force - Waldemar Werther.pdf

732.2 KB

Public Key Cryptanalysis Using Algebraic and Lattice Methods - G. Durfee (2002).pdf

570.7 KB

Defeating Encryption - Security is More than Just Good Crypto - John C. A. Bambenek.pdf

502.8 KB

Методы криптоанализа классических шифров - А.Г. Ростовцев, Н.В. Михайлова.rtf

372.6 KB

Twenty Years of Attacks on the RSA Cryptosystem - Dan Boneh.pdf

310.7 KB

New Directions in Cryptography - Whitfield Diffie, E. Hellman.pdf

266.6 KB

How PGP works (Introduction to Cryptography in the PGP 6.5.1).doc

220.7 KB

Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems - Paul C. Kocher.pdf

211.7 KB

IMPLEMENTATION OF CRYPTOGRAPHY FOR PRIVACY PRESERVING DATA MINING - Anand Sharma, Vibha Ojha.pdf

184.5 KB

ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems - N. Bird, etc.pdf

175.7 KB

Cryptanalysis of MD4 - Hans Dobbertin (J. Cryptology (1998), 11, 253–271).pdf

163.2 KB

Cryptanalysis of ORYX (stream cipher) - D. Wagner, B.Schneier, etc.pdf

159.2 KB

Cryptanalysis of Crypto-1 - Karsten Nohl.pdf

148.4 KB

Finding MD5 Collisions – a Toy For a Notebook - Vlastimil Klíma (2005).pdf

88.5 KB

SECURITY PITFALLS IN CRYPTOGRAPHY - Bruce Schneier (1998).pdf

57.0 KB

/#3 ussue - 27.02.2011/

12 - Руководство по технологиям объединенных сетей.4-е изд. - Cisco Systems (2005).djvu

16.1 MB

13 - Элементарное введение в эллиптическую криптографию. Алгебраические и алгоритмические основы - Болотов А.А. и др., 2006.djvu

15.3 MB

10 - Основы построения беспроводных локальных сетей стандарта 802.11 - Педжман Рошан, Джонатан Лиэри(2004).pdf

15.3 MB

14 - Элементарное введение в эллиптическую криптографию. Протоколы криптографии на эллиптических кривых - Болотов А.А. и др., 2006.djvu

13.0 MB

04 - Введение в криптосистемы с открытым ключом - Н. А. Молдовян, А. А. Молдовян.djvu

10.7 MB

09 - Методы практической криптографии - В.А. Мухачев, В.А. Хорошко (2005).djvu

9.4 MB

[13] ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY (разбито по алфавиту) – Henk C.A. van Tilborg (Eindhoven University of Technology The Netherlands).rar

9.4 MB

03 - Введение в криптографию - 3-е изд. (Под ред. В.В.Ященко, 2001).djvu

8.9 MB

[15] New Encryption Technologies for Communications Designers - Terry Ritter.pdf

8.8 MB

[05] Basic Cryptanalysis - HEADQUARTERS DEPARTMENT OF THE ARMY (Washington, DC, 13 September 1990).rar

8.4 MB

08 - Криптография. Аспекты защиты - А. В. Бабаш,Г.П. Шанкин (2007).djvu

8.3 MB

11 - Практическая криптография, алгоритмы и их программирование - Аграновский А.В., Хади Р.А (2009).djvu

6.5 MB

[13] ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY – Henk C.A. van Tilborg (Eindhoven University of Technology The Netherlands).pdf

5.7 MB

05 - ИБКС - книга по криптографии.pdf

3.9 MB

[07] Coding Theory and Cryptography - The Essentials Monographs and Textbooks in Pure and Applied Mathematics - Hankerson, Darrel R (2000).CHM

3.8 MB

02 - Безопасность глобальных сетевых технологий - Зима,Молдовян (2000).pdf

3.5 MB

06 - Искусство защиты и взлома информации - Дмитрий Скляров (2004).pdf

2.6 MB

[14] Lecture Notes on Cryptography (1999) - Goldwasser S., Belare M.pdf

1.9 MB

[01] A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY Applications for Communications Security - Serge Vaudenay (EPFL).pdf

1.8 MB

[10] Cryptography and Data Security - Peter Gutmann (University of Auckland).pdf

1.7 MB

[19] Rethinking Public Key Infrastructures and Digital Certificates. Building in Privacy - Dr. Stefan Brands (MIT Press, 2000).rar

1.6 MB

[14] Lecture Notes on Cryptography (2008) - Goldwasser S., Belare M.pdf

1.6 MB

[21] RSA Labs FAQ 4.0 - (1998).pdf

1.2 MB

[03] An Introduction to Cryptography - PGP Corporation (2003).pdf

1.2 MB

[02] An Introduction to Cryptography (Copyright © 1990-1999 Network Associates).pdf

1.1 MB

[09] Cryptography and Cryptanalysis Lecture notes - (2001, PS format).rar

882.5 KB

[12] ECS 227 - Modern Cryptography - Phillip Rogaway (2000).rar

859.5 KB

[11] Detecting Steganographic Content on the Internet - Niels Provos Peter Honeyman (2001).pdf

838.4 KB

[17] Practical Cryptography – Niels Ferguson, Bruce Schneier (2003).pdf

629.0 KB

[20] RSA Encryption Algorithm in a Nut Shell - Sarad A.V, Jesko Huettenhain.pdf

401.6 KB

[18] Report on the Development of the Advanced Encryption Standard (AES) - James Nechvatal, etc (2000).pdf

392.6 KB

[08] Cryptography - CISSP Studyguide on Cryptography.doc

342.0 KB

07 - Криптография - Автор Неизвестен.doc

296.4 KB

[16] Number Theory An Related Alghoritm In Cryptography - Alireza Nemaney Pour (2002).pdf

256.1 KB

01 - PGP. Кодирование и шифрование информации с открытым ключом - Максим Левин (2006).pdf

253.1 KB

[06] Block Ciphers And Cryptanalysis - Fauzan Mirza (Department ofMathematics Royal HollowayUniversity of London).pdf

246.9 KB

[04] A SELF-STUDY COURSE IN BLOCK-CIPHER CRYPTANALYSIS - Bruce Schneier.pdf

135.3 KB

/.../История криптографии, о криптографии и безопасности/

BODY OF SECRETS - JAMES BAMFORD (2001, 2002).pdf

4.5 MB

Шифры и революционеры России - Синельников А. В.html

4.4 MB

Зарождение криптографии - Бабаш.rtf

2.9 MB

The Codebreakers. The Story of Secret Writing - David Kahn (Macmillan Pub Co, 1974).pdf

1.8 MB

Cryptography's Role In Securing The Information Society - National Research Council.pdf

1.5 MB

Взломщики кодов - Дэвид Кан (Центрполиграф, 2000).rtf

992.5 KB

История создания и становления Агенства безопасности связи Армии США (1914-1945 гг.) - А. В. Стефанович.rtf

777.3 KB

Кpиптогpафия от папиpуса до компьютеpа (1996) - Жельников Владимиp.HTM

658.9 KB

ФРАНЦ ЭПИНУС. Краткая биографическая хроника, 1724 - 1802 гг - Новик В. К.rtf

391.2 KB

История криптографии и криптоанализа.chm

137.6 KB

Организация системы шифровальной связи в Советском Союзе в период гражданской войны - Чертопруд С.rtf

52.0 KB

/Base/Исходники/QED/

BFISH4.PAS

35.3 KB

BLW-CBC.EXE

14.5 KB

BFISHCBC.PAS

9.6 KB

BLW-CBC.PAS

3.5 KB

HISTORY.TXT

3.1 KB

README.TXT

2.3 KB

ERRORS.TXT

1.3 KB

MEDISIS.COM

1.1 KB

TODO.TXT

0.9 KB

THANKS.TXT

0.8 KB

FILE_ID.DIZ

0.8 KB

/Base/Исходники/RC4SRC/

rc4.c

1.8 KB

rc4.h

0.3 KB

/Base/Исходники/rijnormsrc/

rijndaeltest-ref.c

21.5 KB

table.256

14.6 KB

table.192

12.5 KB

table.128

10.5 KB

rijndael-alg-ref.c

8.5 KB

rijndael-api-ref.c

8.2 KB

rijndael-api-ref.c.bck

8.1 KB

boxes-ref.dat

5.6 KB

rijndael-api-ref.h

4.1 KB

README

1.4 KB

rijndael-alg-ref.h

0.9 KB

Makefile

0.1 KB

/Base/Исходники/rijoptsrc/

boxes-fst.dat

72.4 KB

rijndaeltest-fst.c

20.4 KB

table.256

14.6 KB

rijndael-alg-fst.c

13.2 KB

table.192

12.5 KB

table.128

10.5 KB

rijndael-api-fst.c

9.3 KB

rijndael-api-fst.h

3.4 KB

README

1.8 KB

rijndael-alg-fst.h

0.8 KB

Makefile

0.4 KB

/Base/Исходники/squaresrc/

square.tab

70.2 KB

square.c

18.5 KB

sqtest.c

15.2 KB

sqgen.c

10.6 KB

sqhash.c

7.8 KB

sqcts.c

4.5 KB

sqcfb.c

4.1 KB

sqcbc.c

2.7 KB

sqofb.c

2.2 KB

sqhash.h

1.5 KB

sqecb.c

1.5 KB

sqcts.h

0.9 KB

square.h

0.9 KB

makefile.svr4

0.8 KB

sqcbc.h

0.8 KB

sqcfb.h

0.8 KB

sqofb.h

0.8 KB

makefile.gnu

0.7 KB

sqecb.h

0.7 KB

/Base/Исходники/TEASRC/

TEA_ASM.C

5.5 KB

/Base/Исходники/TSR/

TSRPART3.TXT

41.7 KB

TSRPART2.TXT

25.5 KB

TSRPART7.TXT

24.7 KB

TSRPART6.TXT

19.3 KB

TSRPART1.TXT

13.2 KB

PHOTO.ASM

11.4 KB

TSRPART4.TXT

11.0 KB

HV.ASM

10.6 KB

TSRPART5.TXT

10.0 KB

PHANTOM.ASM

9.6 KB

JOKE.ASM

8.3 KB

TSRCONT.TXT

8.2 KB

MPHOTOF3.EXE

7.0 KB

PHOTOF3.EXE

7.0 KB

BACKTIME.ASM

4.6 KB

TSRAPPB.TXT

4.4 KB

TSRAPPD.TXT

4.2 KB

HOLE.ASM

3.7 KB

TSRAPPE.TXT

3.5 KB

SSLOW.ASM

3.4 KB

TSRAPPA.TXT

3.0 KB

TSRTIT.TXT

2.8 KB

TSRAPPF.TXT

2.6 KB

TSRAPPC.TXT

2.4 KB

TSRLIT.TXT

2.1 KB

/Base/Исходники/twofasmsrc/

TST2FISH.EXE

141.9 KB

2FISH_86.ASM

55.3 KB

TST2FISH.C

47.0 KB

TWOFISH2.C

37.2 KB

AES.H

10.2 KB

TABLE.H

9.4 KB

README

7.2 KB

CPUTYPE.ASM

5.1 KB

STRUCMAC.INC

4.4 KB

PLATFORM.H

2.5 KB

DEBUG.H

2.2 KB

COMPILE.BAT

0.3 KB

/Base/Исходники/twofoptsrc/

TST2FISH.EXE

112.1 KB

TST2FISH.C

47.6 KB

TWOFISH2.C

36.7 KB

AES.H

10.2 KB

TABLE.H

9.4 KB

PLATFORM.H

2.5 KB

README

2.4 KB

DEBUG.H

2.2 KB

COMPILE.BAT

0.1 KB

/.../_CD From Book/CD_Felba/FLINT/LIB/DLL/

FLINT.DLL

94.2 KB

FLINT.LIB

26.1 KB

FLINT.DEF

1.6 KB

MAKEDLL.BAT

0.9 KB

DLLMAIN.C

0.6 KB

DLLMAIN.OBJ

0.6 KB

/.../_CD From Book/CD_Felba/FLINT/LIB/

LIBFLINT.A

8.0 KB

FLINTA.LIB

4.1 KB

FLINTAVC.LIB

4.1 KB

FLINTA.A

0.0 KB

/.../_CD From Book/CD_Felba/FLINT/RSA/

RSAKEY.CPP

19.8 KB

RSADEMO.CPP

8.4 KB

RSAKEY.H

6.1 KB

MAKEFILE.ASM

4.5 KB

MAKEFILE

4.4 KB

/.../_CD From Book/CD_Felba/FLINT/SRC/ASM/CYGWIN/

DIV.S

21.8 KB

SQR.S

12.6 KB

MULT.S

12.2 KB

UMUL.S

10.4 KB

/.../_CD From Book/CD_Felba/FLINT/SRC/ASM/LINUX/

DIV.S

21.2 KB

SQR.S

12.3 KB

MULT.S

12.2 KB

UMUL.S

10.2 KB

/.../_CD From Book/CD_Felba/FLINT/SRC/ASM/

DIV.ASM

23.7 KB

SQR.ASM

12.5 KB

MULT.ASM

12.4 KB

UMUL.ASM

10.5 KB

/.../_CD From Book/CD_Felba/FLINT/SRC/

FLINT.C

258.9 KB

AES.C

134.4 KB

FLINTPP.CPP

87.4 KB

RIPEMD.C

33.8 KB

FLINT.H

26.7 KB

SHA1.C

22.2 KB

FLINTPP.H

21.7 KB

KMUL.C

14.7 KB

AES.H

10.4 KB

RIPEMD.H

6.2 KB

SHA1.H

5.8 KB

KMUL.H

5.5 KB

_ASSERT.H

0.2 KB

/.../_CD From Book/CD_Felba/FLINT/TEST/TESTVALS/

TEST3.BIN

869.5 KB

TEST2.BIN

255.5 KB

TEST1.BIN

153.5 KB

CBCMD88.TXT

119.8 KB

CBCME88.TXT

119.8 KB

CBCME86.TXT

113.4 KB

CBCMD86.TXT

113.4 KB

CBCMD84.TXT

107.0 KB

CBCME84.TXT

107.0 KB

CBCME68.TXT

100.6 KB

CBCMD68.TXT

100.6 KB

CBCMD66.TXT

94.2 KB

CBCME66.TXT

94.2 KB

ECBMD88.TXT

91.0 KB

ECBME88.TXT

91.0 KB

CBCMD64.TXT

87.8 KB

CBCME64.TXT

87.8 KB

ECBMD86.TXT

84.6 KB

ECBME86.TXT

84.6 KB

CBCMD48.TXT

81.4 KB

CBCME48.TXT

81.4 KB

ECBNT88.TXT

79.6 KB

ECBNK88.TXT

79.6 KB

ECBNT86.TXT

79.6 KB

ECBNT84.TXT

79.6 KB

ECBMD84.TXT

78.2 KB

ECBMD68.TXT

78.2 KB

ECBME68.TXT

78.2 KB

ECBME84.TXT

78.2 KB

CBCMD46.TXT

75.0 KB

CBCME46.TXT

75.0 KB

ECBMD66.TXT

71.8 KB

ECBME66.TXT

71.8 KB

ECBNK68.TXT

71.4 KB

CBCME44.TXT

68.6 KB

CBCMD44.TXT

68.6 KB

ECBMD64.TXT

65.4 KB

ECBME64.TXT

65.4 KB

ECBMD48.TXT

65.4 KB

ECBME48.TXT

65.4 KB

ECBNK48.TXT

63.2 KB

ECBMD46.TXT

59.0 KB

ECBME46.TXT

59.0 KB

ECBNK86.TXT

53.6 KB

ECBME44.TXT

52.6 KB

ECBMD44.TXT

52.6 KB

ECBNT68.TXT

47.5 KB

ECBNT66.TXT

47.5 KB

ECBNK66.TXT

47.5 KB

ECBNT64.TXT

47.5 KB

ECBNK46.TXT

41.3 KB

ECBVT88.TXT

40.1 KB

ECBVK88.TXT

40.1 KB

ECBVT86.TXT

40.1 KB

ECBVT84.TXT

40.1 KB

ECBVK68.TXT

36.0 KB

ECBVK48.TXT

31.8 KB

ECBNK84.TXT

31.7 KB

ECBNK64.TXT

27.6 KB

ECBVK86.TXT

27.1 KB

ECBVT68.TXT

24.0 KB

ECBVT66.TXT

24.0 KB

ECBVK66.TXT

24.0 KB

ECBVT64.TXT

24.0 KB

ECBNT48.TXT

23.6 KB

ECBNT46.TXT

23.5 KB

ECBNT44.TXT

23.5 KB

ECBNK44.TXT

23.5 KB

ECBVK46.TXT

20.9 KB

ECBVK84.TXT

16.1 KB

ECBVK64.TXT

14.0 KB

ECBVT48.TXT

12.0 KB

ECBVT46.TXT

12.0 KB

ECBVT44.TXT

12.0 KB

ECBVK44.TXT

12.0 KB

/.../_CD From Book/CD_Felba/FLINT/TEST/

FLINTPP.OBJ

121.9 KB

TESTARI.EXE

118.8 KB

TESTROOT.EXE

114.7 KB

TESTMEXP.EXE

110.6 KB

TESTPRRT.EXE

98.3 KB

TESTXGCD.EXE

90.1 KB

TESTCHIN.EXE

90.1 KB

TESTBAS.EXE

86.0 KB

TESTCNST.EXE

86.0 KB

FLINT.OBJ

82.8 KB

TESTDIV.EXE

81.9 KB

TESTIROO.EXE

77.8 KB

TESTMMUL.EXE

77.8 KB

TESTBBS.EXE

77.8 KB

TESTMSQR.EXE

77.8 KB

TESTGCD.EXE

77.8 KB

TESTSHFT.EXE

73.7 KB

TESTKAR.EXE

73.7 KB

TESTRAND.EXE

73.7 KB

TESTADD.EXE

73.7 KB

TESTMSUB.EXE

73.7 KB

TESTMUL.EXE

73.7 KB

TESTSUB.EXE

73.7 KB

TESTMADD.EXE

73.7 KB

TESTSET.EXE

69.6 KB

TESTBOOL.EXE

69.6 KB

TESTSQR.EXE

69.6 KB

TESTREG.EXE

65.5 KB

TESTMEXP.OBJ

65.4 KB

TESTRIPE.EXE

49.2 KB

TESTSHA1.EXE

45.1 KB

TESTBAS.OBJ

44.1 KB

TESTARI.OBJ

41.2 KB

TESTMEXP.C

40.8 KB

TESTDIV.OBJ

33.4 KB

TESTROOT.OBJ

33.0 KB

TESTBAS.C

32.8 KB

TESTCNST.OBJ

25.9 KB

TESTAES.C

24.8 KB

TESTDIV.C

23.5 KB

TESTMUL.OBJ

20.9 KB

TESTMMUL.OBJ

19.9 KB

TESTKAR.OBJ

19.8 KB

TESTCNST.CPP

17.6 KB

TESTMMUL.C

16.7 KB

TESTPRRT.OBJ

16.2 KB

TESTARI.CPP

16.2 KB

TESTCHIN.OBJ

16.2 KB

TESTMUL.C

15.8 KB

TESTROOT.CPP

15.2 KB

TESTKAR.C

15.1 KB

TESTSUB.OBJ

14.9 KB

TESTADD.OBJ

14.8 KB

TESTMSQR.OBJ

14.7 KB

TESTMSUB.OBJ

14.7 KB

TESTSHFT.OBJ

13.9 KB

TESTMSQR.C

13.6 KB

TESTMADD.OBJ

13.5 KB

TESTGCD.OBJ

13.0 KB

TESTRIPE.C

12.3 KB

TESTSUB.C

12.2 KB

TESTMSUB.C

11.9 KB

TESTPRRT.CPP

11.8 KB

TESTADD.C

11.7 KB

TESTIROO.OBJ

11.6 KB

TESTGCD.C

11.4 KB

TESTBOOL.OBJ

11.2 KB

TESTXGCD.OBJ

11.1 KB

TESTSHFT.C

11.0 KB

TESTMADD.C

11.0 KB

TESTSQR.OBJ

10.3 KB

TESTIROO.C

9.9 KB

TESTSET.C

9.9 KB

TESTSET.OBJ

9.7 KB

TESTBOOL.C

9.6 KB

TESTGCCA.BAT

9.2 KB

TESTRIPE.OBJ

9.2 KB

TESTSQR.C

9.0 KB

RIPEMD.OBJ

8.6 KB

TESTVCA.BAT

8.2 KB

TESTGCCA.CMD

8.2 KB

TESTDLL.BAT

8.0 KB

TESTCHIN.CPP

8.0 KB

TESTGCC.BAT

7.9 KB

TESTGCC.CMD

7.6 KB

TESTVC.BAT

7.3 KB

TESTREG.C

7.2 KB

TESTXGCD.CPP

7.1 KB

TESTBBS.C

6.9 KB

TESTRAND.C

6.9 KB

MAKEFILE.ASM

6.3 KB

MAKEFILE

6.2 KB

TESTBBS.OBJ

6.1 KB

TESTRAND.OBJ

6.1 KB

TESTSHA1.C

6.0 KB

TESTREG.OBJ

5.8 KB

KMUL.OBJ

3.7 KB

TESTSHA1.OBJ

3.6 KB

SHA1.OBJ

3.2 KB

/.../_CD From Book/CD_Felba/RIJNDAEL/C_CPP/AES_ASM/

AES_ASM.DSP

5.5 KB

AES_ASM.VCPROJ

4.5 KB

AES_ASM.PLG

0.6 KB

/.../_CD From Book/CD_Felba/RIJNDAEL/C_CPP/AES_DLL/

AES_DLL.VCPROJ

5.6 KB

AES_DLL.DSP

4.8 KB

AES_DLL.PLG

1.4 KB

/.../_CD From Book/CD_Felba/RIJNDAEL/C_CPP/AES_GAV/

AES_GAV.VCPROJ

5.2 KB

AES_GAV.DSP

5.1 KB

AES_GAV.PLG

1.0 KB

/.../_CD From Book/CD_Felba/RIJNDAEL/C_CPP/AES_RAV/

AES_RAV.VCPROJ

5.5 KB

AES_RAV.DSP

5.4 KB

AES_RAV.PLG

1.6 KB

/.../_CD From Book/CD_Felba/RIJNDAEL/C_CPP/AES_TMR/

AES_TMR.DSP

5.5 KB

AES_TMR.VCPROJ

5.5 KB

AES_TMR.PLG

1.4 KB

/.../_CD From Book/CD_Felba/RIJNDAEL/C_CPP/AES_TST/

AES_TST.DSP

4.8 KB

AES_TST.VCPROJ

4.6 KB

AES_TST.PLG

1.3 KB

/.../_CD From Book/CD_Felba/RIJNDAEL/C_CPP/AES_XAM/

AES_XAM.DSP

4.8 KB

AES_XAM.VCPROJ

3.9 KB

AES_XAM.PLG

1.4 KB

/.../_CD From Book/CD_Felba/RIJNDAEL/C_CPP/OUTVALS/

OUTVALS.TXT

0.0 KB

/.../_CD From Book/CD_Felba/RIJNDAEL/C_CPP/TESTVALS/

CBCMD88.TXT

119.8 KB

CBCME88.TXT

119.8 KB

CBCMD87.TXT

116.6 KB

CBCME87.TXT

116.6 KB

CBCME86.TXT

113.4 KB

CBCMD86.TXT

113.4 KB

CBCME85.TXT

110.2 KB

CBCME78.TXT

110.2 KB

CBCMD78.TXT

110.2 KB

CBCMD85.TXT

110.2 KB

CBCME84.TXT

107.0 KB

CBCME77.TXT

107.0 KB

CBCMD77.TXT

107.0 KB

CBCMD84.TXT

107.0 KB

CBCME76.TXT

103.8 KB

CBCMD76.TXT

103.8 KB

CBCMD75.TXT

100.6 KB

CBCME75.TXT

100.6 KB

CBCMD68.TXT

100.6 KB

CBCME68.TXT

100.6 KB

CBCMD74.TXT

97.4 KB

CBCMD67.TXT

97.4 KB

CBCME67.TXT

97.4 KB

CBCME74.TXT

97.4 KB

CBCME66.TXT

94.2 KB

CBCMD66.TXT

94.2 KB

CBCMD58.TXT

91.0 KB

CBCMD65.TXT

91.0 KB

ECBMD88.TXT

91.0 KB

ECBME88.TXT

91.0 KB

CBCME65.TXT

91.0 KB

CBCME58.TXT

91.0 KB

CBCME57.TXT

87.8 KB

CBCMD57.TXT

87.8 KB

CBCME64.TXT

87.8 KB

CBCMD64.TXT

87.8 KB

ECBMD87.TXT

87.8 KB

ECBME87.TXT

87.8 KB

ECBME86.TXT

84.6 KB

ECBMD86.TXT

84.6 KB

CBCME56.TXT

84.6 KB

ECBME78.TXT

84.6 KB

CBCMD56.TXT

84.6 KB

ECBMD78.TXT

84.6 KB

CBCMD55.TXT

81.4 KB

CBCMD48.TXT

81.4 KB

CBCME55.TXT

81.4 KB

ECBMD77.TXT

81.4 KB

ECBME85.TXT

81.4 KB

ECBMD85.TXT

81.4 KB

CBCME48.TXT

81.4 KB

ECBME77.TXT

81.4 KB

ECBNT88.TXT

79.6 KB

ECBNK88.TXT

79.6 KB

ECBNT87.TXT

79.6 KB

ECBNT86.TXT

79.6 KB

ECBNT85.TXT

79.6 KB

ECBNT84.TXT

79.6 KB

CBCME54.TXT

78.2 KB

CBCMD47.TXT

78.2 KB

CBCME47.TXT

78.2 KB

CBCMD54.TXT

78.2 KB

ECBME68.TXT

78.2 KB

ECBMD68.TXT

78.2 KB

ECBME76.TXT

78.2 KB

ECBMD84.TXT

78.2 KB

ECBMD76.TXT

78.2 KB

ECBME84.TXT

78.2 KB

ECBNK78.TXT

75.5 KB

ECBMD75.TXT

75.0 KB

CBCME46.TXT

75.0 KB

CBCMD46.TXT

75.0 KB

ECBME67.TXT

75.0 KB

ECBMD67.TXT

75.0 KB

ECBME75.TXT

75.0 KB

ECBMD66.TXT

71.8 KB

CBCME45.TXT

71.8 KB

ECBME58.TXT

71.8 KB

CBCMD45.TXT

71.8 KB

ECBMD74.TXT

71.8 KB

ECBMD58.TXT

71.8 KB

ECBME74.TXT

71.8 KB

ECBME66.TXT

71.8 KB

ECBNK68.TXT

71.4 KB

ECBME57.TXT

68.6 KB

CBCMD44.TXT

68.6 KB

ECBME65.TXT

68.6 KB

CBCME44.TXT

68.6 KB

ECBMD57.TXT

68.6 KB

ECBMD65.TXT

68.6 KB

ECBNK58.TXT

67.3 KB

ECBNK87.TXT

66.1 KB

ECBME56.TXT

65.4 KB

ECBMD48.TXT

65.4 KB

ECBME48.TXT

65.4 KB

ECBMD56.TXT

65.4 KB

ECBMD64.TXT

65.4 KB

ECBME64.TXT

65.4 KB

ECBNK48.TXT

63.2 KB

ECBNT78.TXT

62.5 KB

ECBNT77.TXT

62.5 KB

ECBNK77.TXT

62.5 KB

ECBNT76.TXT

62.5 KB

ECBNT75.TXT

62.5 KB

ECBNT74.TXT

62.5 KB

ECBMD55.TXT

62.2 KB

ECBMD47.TXT

62.2 KB

ECBME55.TXT

62.2 KB

ECBME47.TXT

62.2 KB

ECBME54.TXT

59.0 KB

ECBME46.TXT

59.0 KB

ECBMD54.TXT

59.0 KB

ECBMD46.TXT

59.0 KB

ECBNK67.TXT

58.9 KB

ECBMD45.TXT

55.8 KB

ECBME45.TXT

55.8 KB

ECBNK57.TXT

55.3 KB

ECBNK86.TXT

53.6 KB

ECBME44.TXT

52.6 KB

ECBMD44.TXT

52.6 KB

ECBNK47.TXT

51.7 KB

ECBNK76.TXT

50.6 KB

ECBNT68.TXT

47.5 KB

ECBNT67.TXT

47.5 KB

ECBNT66.TXT

47.5 KB

ECBNK66.TXT

47.5 KB

ECBNT65.TXT

47.5 KB

ECBNT64.TXT

47.5 KB

ECBNK56.TXT

44.4 KB

ECBNK85.TXT

42.2 KB

ECBNK46.TXT

41.3 KB

ECBVT88.TXT

40.1 KB

ECBVK88.TXT

40.1 KB

ECBVT87.TXT

40.1 KB

ECBVT86.TXT

40.1 KB

ECBVT85.TXT

40.1 KB

ECBVT84.TXT

40.1 KB

ECBNK75.TXT

39.6 KB

ECBVK78.TXT

38.0 KB

ECBNK65.TXT

37.0 KB

ECBVK68.TXT

36.0 KB

ECBNT58.TXT

34.5 KB

ECBNT57.TXT

34.5 KB

ECBNT56.TXT

34.5 KB

ECBNT55.TXT

34.5 KB

ECBNK55.TXT

34.5 KB

ECBNT54.TXT

34.5 KB

ECBVK58.TXT

33.9 KB

ECBVK87.TXT

33.3 KB

ECBNK45.TXT

31.9 KB

ECBVK48.TXT

31.8 KB

ECBNK84.TXT

31.7 KB

ECBVT78.TXT

31.5 KB

ECBVT77.TXT

31.5 KB

ECBVK77.TXT

31.5 KB

ECBVT76.TXT

31.5 KB

ECBVT75.TXT

31.5 KB

ECBVT74.TXT

31.5 KB

ECBVK67.TXT

29.7 KB

ECBNK74.TXT

29.7 KB

ECBVK57.TXT

27.9 KB

ECBNK64.TXT

27.6 KB

ECBVK86.TXT

27.1 KB

ECBVK47.TXT

26.1 KB

ECBNK54.TXT

25.6 KB

ECBVK76.TXT

25.5 KB

ECBVT68.TXT

24.0 KB

ECBVT67.TXT

24.0 KB

ECBVT66.TXT

24.0 KB

ECBVK66.TXT

24.0 KB

ECBVT65.TXT

24.0 KB

ECBVT64.TXT

24.0 KB

ECBNT48.TXT

23.6 KB

ECBNT47.TXT

23.5 KB

ECBNT46.TXT

23.5 KB

ECBNT45.TXT

23.5 KB

ECBNT44.TXT

23.5 KB

ECBNK44.TXT

23.5 KB

ECBVK56.TXT

22.4 KB

ECBVK85.TXT

21.4 KB

ECBVK46.TXT

20.9 KB

ECBVK75.TXT

20.1 KB

ECBVK65.TXT

18.8 KB

ECBVT58.TXT

17.5 KB

ECBVT57.TXT

17.5 KB

ECBVT56.TXT

17.5 KB

ECBVT55.TXT

17.5 KB

ECBVK55.TXT

17.5 KB

ECBVT54.TXT

17.5 KB

ECBVK45.TXT

16.2 KB

ECBVK84.TXT

16.1 KB

ECBVK74.TXT

15.1 KB

ECBVK64.TXT

14.0 KB

ECBVK54.TXT

13.0 KB

ECBVT48.TXT

12.0 KB

ECBVT47.TXT

12.0 KB

ECBVT46.TXT

12.0 KB

ECBVT45.TXT

12.0 KB

ECBVT44.TXT

12.0 KB

ECBVK44.TXT

12.0 KB

VB.TXT

3.2 KB

TESTVALS.TXT

0.0 KB

/.../_CD From Book/CD_Felba/RIJNDAEL/C_CPP/

AES.OPT

80.4 KB

VBAXAM.DOC

48.6 KB

AESOPT.H

28.0 KB

AESGAV.CPP

23.1 KB

AESTST.CPP

18.5 KB

AESTAB.C

17.9 KB

AESCRYPP.C

16.0 KB

AESKEY.C

13.9 KB

AESCRYPT.C

13.7 KB

AESKEYPP.C

12.9 KB

AESXAM.C

12.8 KB

AESRAV.CPP

12.4 KB

AESCRYPT.ASM

10.6 KB

AESTMR.CPP

10.4 KB

AESAUX.CPP

7.6 KB

AES.TXT

3.3 KB

AESTST.H

3.2 KB

AES.H

2.9 KB

AES.SLN

2.7 KB

AESAUX.H

2.7 KB

UITYPES.H

2.5 KB

AESCPP.H

2.1 KB

AES.DSW

1.7 KB

/.../_CD From Book/CD_Felba/RIJNDAEL/C_OPT/

CBC_D_M_REF.TXT

201.5 KB

CBC_E_M_REF.TXT

201.5 KB

ECB_D_M_REF.TXT

158.4 KB

ECB_E_M_REF.TXT

158.4 KB

RIJNDAEL_ALG_FST.C

63.7 KB

ECB_VK_REF.TXT

57.4 KB

ECB_TBL_REF.TXT

51.0 KB

ECB_VT_REF.TXT

30.4 KB

RIJNDAEL_TEST_FST.C

26.8 KB

TABLE.256

14.6 KB

TABLE.192

12.5 KB

RIJNDAEL_API_FST.C

11.7 KB

TABLE.128

10.5 KB

FIPS_TEST_VECTORS.TXT

6.7 KB

RIJNDAEL_API_FST.H

4.7 KB

ECB_IV_REF.TXT

3.6 KB

README

3.5 KB

RIJNDAEL_ALG_FST.H

2.0 KB

AESDIFF.BAT

0.3 KB

MAKEFILE

0.2 KB

/.../_CD From Book/CD_Felba/RIJNDAEL/C_REF/

CBC_E_M_REF.TXT

208.8 KB

CBC_D_M_REF.TXT

208.8 KB

CBC_D_M.TXT

201.5 KB

CBC_E_M.TXT

201.5 KB

ECB_E_M_REF.TXT

158.4 KB

ECB_D_M.TXT

158.4 KB

ECB_D_M_REF.TXT

158.4 KB

ECB_E_M.TXT

158.4 KB

ECB_VK.TXT

57.4 KB

ECB_VK_REF.TXT

57.4 KB

ECB_TBL_REF.TXT

53.0 KB

ECB_TBL.TXT

51.1 KB

ECB_VT.TXT

30.4 KB

ECB_VT_REF.TXT

30.4 KB

RIJNDAELTEST_REF.C

21.5 KB

TABLE.256

14.6 KB

TABLE.192

12.5 KB

TABLE.128

10.5 KB

RIJNDAEL_ALG_REF.C

8.7 KB

RIJNDAEL_API_REF.C

8.3 KB

BOXES_REF.DAT

5.6 KB

RIJNDAEL_API_REF.H

4.1 KB

ECB_IV.TXT

3.6 KB

ECB_IV_REF.TXT

3.6 KB

README

1.8 KB

RIJNDAEL_ALG_REF.H

1.0 KB

AESDIFF.BAT

0.3 KB

MAKEFILE

0.2 KB

/.../_CD From Book/CD_Felba/

PACKAGE.TXT

14.6 KB

ReadmeWin.txt

11.9 KB

/.../_CD From Book/CD_Hadi/Documents/1 ~1.FIL/

002879-16.gif

11.8 KB

/.../_CD From Book/CD_Hadi/Documents/5 ~1.FIL/

001409-193.gif

9.0 KB

/.../_CD From Book/CD_Hadi/Documents/8 ~1.FIL/

P7-1.GIF

7.9 KB

P7-2.GIF

7.6 KB

fon.jpeg

4.6 KB

/.../_CD From Book/CD_Hadi/Documents/

5.HTM

84.1 KB

7.HTM

38.0 KB

8.HTM

23.7 KB

1.HTM

22.0 KB

4.HTM

7.4 KB

9.HTM

6.1 KB

/.../_CD From Book/CD_Hadi/LIBRARY/AES/DAEMEN/

THREEWAY.PDF

191.7 KB

T.PDF

176.5 KB

CORMAT.PDF

166.5 KB

RESYNC.PDF

148.0 KB

/.../_CD From Book/CD_Hadi/LIBRARY/AES/

R2REPORT.PDF

392.6 KB

NSA-AESfinalreport.pdf

169.2 KB

R1REPORT.HTM

130.9 KB

rijndael-statement.pdf

109.3 KB

SNEFRU.ZIP

35.6 KB

AES.HTM

22.0 KB

TABLE.256

14.7 KB

bc.html

12.8 KB

TABLE.192

12.7 KB

SPLAY.ZIP

11.2 KB

TABLE.128

10.6 KB

rijndael-alg-ref.c

10.5 KB

KHUFU.ZIP

7.6 KB

81.HTM

7.5 KB

ALGS.HTM

6.6 KB

ZIP

5.9 KB

a5.tar.zip

5.2 KB

LUCIFER2.ZIP

3.7 KB

LCRNG-T.ZIP

3.3 KB

TRNSPOSE.ZIP

3.3 KB

rijndael-alg-ref.h

2.6 KB

3-WAY.ZIP

1.5 KB

/.../_CD From Book/CD_Hadi/LIBRARY/COMMON/

crypto_militaire_1.pdf

458.2 KB

cl.cam.ac.uk~fapp2kerckhoffs.html

9.9 KB

/.../_CD From Book/CD_Hadi/LIBRARY/cryptocompress/BWT/

compresA.htm

21.1 KB

DF000000.HTM

3.6 KB

COMPRES9.HTM

3.0 KB

NBCI_LOG.GIF

0.8 KB

DISCLAIM.GIF

0.4 KB

04_BKG10.JPG

0.3 KB

BUTTON_S.GIF

0.2 KB

BUTTON_B.GIF

0.2 KB

LG_GODAD.GIF

0.2 KB

LG_BMG00.GIF

0.2 KB

BUTTON_D.GIF

0.1 KB

BUTTON_C.GIF

0.1 KB

/.../_CD From Book/CD_Hadi/LIBRARY/cryptocompress/

p825-vitter.pdf

1.6 MB

p520-witten.pdf

1.6 MB

p42-floyd.pdf

946.4 KB

p464-larmore.pdf

739.2 KB

p80-bookstein.pdf

734.8 KB

p122-choueka.pdf

646.9 KB

p158-vitter.pdf

625.6 KB

p612-mcintyre.pdf

503.9 KB

p256-moffat.pdf

487.3 KB

/.../_CD From Book/CD_Hadi/LIBRARY/DECRYPT/LUCIFER/

LUCIFER.C

17.8 KB

lucifer_src.htm

9.7 KB

/.../_CD From Book/CD_Hadi/LIBRARY/DECRYPT/V/FREQ/

mexample2.html

20.6 KB

mexample4.html

18.1 KB

mexample1.html

7.0 KB

ROTOR.C

4.1 KB

LETTERS.C

3.3 KB

mexample3.html

2.7 KB

MONO.C

2.4 KB

monocrypt.html

2.3 KB

VIGENERE.C

1.4 KB

POLY.CPP

1.2 KB

SHIFT.CPP

0.9 KB

/.../_CD From Book/CD_Hadi/LIBRARY/DECRYPT/V/HILL/

HILL0.C

3.7 KB

HILL.1

2.5 KB

HILL

1.6 KB

TABLE.I

1.2 KB

KAPPA.C

0.6 KB

README

0.5 KB

MAKEFILE

0.2 KB

/.../_CD From Book/CD_Hadi/LIBRARY/DECRYPT/V/keylength/

example3.html

10.3 KB

example2.html

7.0 KB

example1.html

5.6 KB

keylength.c

2.6 KB

/.../_CD From Book/CD_Hadi/LIBRARY/DECRYPT/V/SOLVE/

SOLVEVIG.C

12.4 KB

DIGRAMS

2.9 KB

BUILDDIG.C

1.9 KB

RDDITBL.C

1.3 KB

README

0.8 KB

Makefile

0.6 KB

USAGE.C

0.4 KB

ALFAONLY.C

0.4 KB

RDDITBL.H

0.2 KB

comp-sup-17

0.1 KB

smalldict

0.1 KB

P.H

0.1 KB

/.../_CD From Book/CD_Hadi/LIBRARY/DECRYPT/V/

solve-monoalphabetic-cryptologia-july92.pascal.tar

966.7 KB

SOLVEVIG.C

7.6 KB

VIGENERE

6.7 KB

vigenerecrypt.html

4.0 KB

VIGENERE.C

1.5 KB

/.../_CD From Book/CD_Hadi/LIBRARY/DECRYPT/

taber-crypt200-cryptogram-solver-msdos.zip

742.5 KB

cain94how.pdf

720.8 KB

ravi93statistical.pdf

454.7 KB

crank-0.2.1.tar.gz

271.9 KB

murphy94likelihood.pdf

267.0 KB

SUBST.PDF

169.9 KB

jakobsen95fast.pdf

159.0 KB

the-cryptanalysis-of-a.pdf

144.5 KB

less04.html

21.8 KB

less02.html

18.4 KB

less03.html

18.4 KB

less06.html

10.5 KB

less05.html

10.5 KB

ROTOR.C

5.1 KB

N-GRAM.C

4.5 KB

ENTROPY.C

3.8 KB

CHI-SQ.C

3.7 KB

PLAYFAIR

3.4 KB

TEXTSTRP.C

2.9 KB

KAPPA.C

2.3 KB

HEADER.H

2.2 KB

MAKEFILE

1.9 KB

BLOCK.C

1.5 KB

PLAYFAIR.ZIP

1.4 KB

CAESAR.C

1.4 KB

ROTOR.CFG

1.3 KB

GETOPT.C

1.2 KB

CAPITAL.C

1.0 KB

GET_KEY.C

0.6 KB

/.../_CD From Book/CD_Hadi/LIBRARY/DES/abrahamsen/

27.TIF

142.7 KB

25.TIF

135.9 KB

26.TIF

132.5 KB

24.TIF

132.0 KB

29.TIF

124.2 KB

23.TIF

118.9 KB

28.TIF

113.5 KB

01.TIF

38.1 KB

08.TIF

36.7 KB

02.TIF

36.2 KB

04.TIF

34.2 KB

13.TIF

33.4 KB

03.TIF

32.2 KB

07.TIF

30.5 KB

12.TIF

30.4 KB

05.TIF

30.1 KB

09.TIF

29.5 KB

06.TIF

26.6 KB

20.TIF

23.9 KB

15.TIF

23.8 KB

16.TIF

23.8 KB

14.TIF

22.1 KB

17.TIF

21.4 KB

10.TIF

20.8 KB

18.TIF

20.8 KB

11.TIF

17.7 KB

19.TIF

17.5 KB

22.TIF

12.9 KB

21.TIF

12.5 KB

/.../_CD From Book/CD_Hadi/LIBRARY/DES/PATENT/

20.TIF

129.0 KB

21.TIF

127.9 KB

23.TIF

126.9 KB

29.TIF

126.1 KB

17.TIF

124.7 KB

30.TIF

119.2 KB

31.TIF

117.1 KB

33.TIF

116.9 KB

22.TIF

116.8 KB

35.TIF

116.0 KB

34.TIF

115.7 KB

36.TIF

115.2 KB

32.TIF

114.3 KB

37.TIF

111.5 KB

28.TIF

108.6 KB

19.TIF

107.9 KB

18.TIF

97.8 KB

01.TIF

89.2 KB

24.TIF

71.9 KB

26.TIF

66.9 KB

25.TIF

59.5 KB

38.TIF

39.7 KB

13.TIF

38.8 KB

02.TIF

37.0 KB

27.TIF

35.0 KB

14.TIF

30.9 KB

08.TIF

30.5 KB

07.TIF

29.6 KB

09.TIF

29.1 KB

05.TIF

29.0 KB

15.TIF

28.8 KB

04.TIF

27.4 KB

06.TIF

27.0 KB

11.TIF

25.2 KB

16.TIF

22.4 KB

03.TIF

17.5 KB

12.TIF

17.1 KB

/.../_CD From Book/CD_Hadi/LIBRARY/DES/

cracking-des.tar.gz

1.2 MB

rijndaelaes.pdf

1.0 MB

report01-2.pdf

706.1 KB

SQUARE_mean.pdf

319.6 KB

pfitzmann93more.pdf

298.1 KB

gutowitz93cryptography.pdf

289.8 KB

keysched-icics97.pdf

264.5 KB

how-to-strengthen-des.pdf

197.2 KB

WRLA.PDF

187.0 KB

further-comments.pdf

178.5 KB

a5-nessie.pdf

147.8 KB

kelsey00cryptanalytic.pdf

129.8 KB

knudsen99some.pdf

122.2 KB

uibwp3-001a.pdf

95.6 KB

uibwp3-002.pdf

54.1 KB

Andreev23.html

17.4 KB

gost.c..c

10.8 KB

DEPONKEY.ZIP

9.1 KB

cropenkey.zip

8.6 KB

PBSOI.ZIP

8.4 KB

Gost.pm..pm

2.0 KB

/.../_CD From Book/CD_Hadi/LIBRARY/FEISTEL/FEISTEL2/

11.TIF

123.6 KB

13.TIF

121.0 KB

12.TIF

114.8 KB

10.TIF

107.7 KB

01.TIF

55.1 KB

14.TIF

51.1 KB

04.TIF

46.0 KB

06.TIF

44.0 KB

05.TIF

32.6 KB

07.TIF

28.9 KB

02.TIF

26.0 KB

09.TIF

25.8 KB

03.TIF

25.8 KB

08.TIF

23.9 KB

/.../_CD From Book/CD_Hadi/LIBRARY/FEISTEL/HORST/

29.TIF

119.3 KB

30.TIF

117.6 KB

31.TIF

116.9 KB

27.TIF

114.6 KB

32.TIF

113.9 KB

28.TIF

108.8 KB

33.TIF

95.5 KB

17.TIF

51.3 KB

01.TIF

43.1 KB

19.TIF

38.1 KB

23.TIF

35.6 KB

04.TIF

34.5 KB

18.TIF

33.2 KB

08.TIF

33.0 KB

05.TIF

29.9 KB

20.TIF

29.6 KB

06.TIF

29.0 KB

07.TIF

27.5 KB

12.TIF

26.7 KB

22.TIF

26.5 KB

25.TIF

26.1 KB

15.TIF

25.5 KB

10.TIF

24.8 KB

11.TIF

24.7 KB

14.TIF

23.9 KB

21.TIF

22.9 KB

24.TIF

22.8 KB

13.TIF

21.8 KB

09.TIF

21.3 KB

26.TIF

18.5 KB

02.TIF

11.5 KB

16.TIF

10.8 KB

03.TIF

7.7 KB

/.../_CD From Book/CD_Hadi/LIBRARY/FEISTEL/

Feistel.pdf

1.1 MB

unbalanced_feistel.pdf

226.8 KB

nakahara99diffusion.pdf

132.6 KB

Feistc.txt

2.2 KB

/.../_CD From Book/CD_Hadi/LIBRARY/GENE/

bagnall96applications.pdf

904.6 KB

tomassini95survey.pdf

297.7 KB

/.../_CD From Book/CD_Hadi/LIBRARY/LIBS/

sts-1.4.zip

4.1 MB

CRYPTO42.ZIP

500.5 KB

/.../_CD From Book/CD_Hadi/LIBRARY/MILCRYPT/

APPD.PDF

4.4 MB

APPA.PDF

1.1 MB

CH9.PDF

686.5 KB

APPF.PDF

578.4 KB

CH4.PDF

536.5 KB

CH5.PDF

413.2 KB

CH6.PDF

310.2 KB

CH10.PDF

289.6 KB

CH7.PDF

277.1 KB

APPE.PDF

266.0 KB

INDEX.PDF

250.5 KB

CH8.PDF

219.6 KB

APPC.PDF

192.9 KB

TOC.PDF

169.6 KB

APPB.PDF

162.1 KB

CH3.PDF

139.0 KB

CH2.PDF

130.3 KB

CH12.PDF

97.2 KB

CH14.PDF

77.0 KB

CH11.PDF

76.9 KB

CH13.PDF

76.6 KB

CH15.PDF

26.2 KB

CH1.PDF

24.6 KB

INTRO.PDF

15.7 KB

AUTH.PDF

9.7 KB

GLOSS.PDF

8.8 KB

PREF.PDF

8.1 KB

REF.PDF

8.1 KB

/.../_CD From Book/CD_Hadi/LIBRARY/MISC/

codebook_solution.pdf

332.3 KB

FAPSI_cert.pdf

299.3 KB

defend_national.pdf

130.4 KB

dyn_transposition.html

45.0 KB

dyn_transposition_rev.html

38.7 KB

ENIGMA.JPG

28.6 KB

HAGELIN.JPG

24.6 KB

DELILAH.JPG

16.4 KB

/.../_CD From Book/CD_Hadi/LIBRARY/MODES/

sp-800-22-051501.pdf

1.5 MB

2dem-spec.pdf

1.2 MB

xcbc-spec.pdf

825.7 KB

xecb-mac-spec.pdf

825.7 KB

rogaway01ocb.pdf

624.9 KB

IGE-SPEC.PDF

536.7 KB

OCB-SPEC.PDF

387.3 KB

KFB-SPEC.PDF

330.0 KB

pmac-spec.pdf

310.0 KB

iapm-spec.pdf

304.1 KB

ABC-SPEC.PDF

239.4 KB

sp800-38a.pdf

229.8 KB

rmac-spec.pdf

158.8 KB

AESHASH.PDF

73.9 KB

CTR-SPEC.PDF

61.6 KB

OCB.PDF

53.4 KB

pcfb-spec.pdf

52.8 KB

REPORT.PDF

47.3 KB

xcbc-mac-spec.pdf

46.5 KB

iacbc-spec.pdf

37.1 KB

workshop-report.pdf

33.0 KB

MODES.PDF

31.5 KB

nist.govencryptionmodesproposedmodes.html

24.3 KB

/.../_CD From Book/CD_Hadi/LIBRARY/NAVAJO/

127-N-101511.gif

46.0 KB

127-MN-A-57876.gif

42.5 KB

navajo_faq61-4.htm

39.7 KB

JUNGLE.JPG

32.7 KB

code.html

9.7 KB

navajo_faq61-2.htm

7.7 KB

127-mn-101511.html

7.3 KB

WindTalkers.pdf

7.0 KB

127-mn-a-57876.html

6.5 KB

navajo_faq12-1.htm

6.4 KB

/.../_CD From Book/CD_Hadi/LIBRARY/SBOX/

SP800-22b.pdf

1.5 MB

klapper99algebraic.pdf

357.5 KB

tomassini95survey.pdf

297.7 KB

desing-of-substitution-blocks.pdf

199.6 KB

CAST-256.PDF

106.1 KB

mister96practical.pdf

89.7 KB

adams_paper2.pdf

37.6 KB

/.../_CD From Book/CD_Hadi/LIBRARY/SHANNON/

SHANNON.PDF

988.7 KB

GLOSSARY.HTM

481.9 KB

HOMOPHON.HTM

208.4 KB

95-3510XclaudeXshannonXolderXphoto.jpg

110.5 KB

95-3510X.JPG

110.5 KB

1218shift.pdf

60.7 KB

SBOXDESN.HTM

57.2 KB

SHANNON2.JPG

48.6 KB

NONLMEAS.HTM

44.0 KB

SHANNON3.JPG

38.6 KB

FEISNONL.HTM

32.2 KB

shannonbib.html

30.4 KB

VSBCNONL.HTM

28.8 KB

shannonbio.html

27.4 KB

8808D.HTM

21.6 KB

MEASNONL.HTM

20.7 KB

shannonmouse.jpg

18.5 KB

Shannon.html

14.4 KB

27.HTM

13.7 KB

whatis.html

13.4 KB

shannon3.html

12.3 KB

048-051.html

11.7 KB

067-069.html

11.4 KB

064-067.html

11.3 KB

044-047.html

11.2 KB

053-056.html

9.5 KB

061-064.html

8.9 KB

056-059.html

8.9 KB

051-053.html

8.6 KB

059-061.html

8.1 KB

ces5.html

7.8 KB

shannons.html

7.7 KB

Shannon.jpeg

6.9 KB

CO0401.HTM

5.2 KB

CREST001.GIF

4.6 KB

CREST000.GIF

4.6 KB

Shannon2.html

3.7 KB

Shannon0.jpg

1.4 KB

Shannon.jpg

1.4 KB

JSSTYLE0.CSS

0.8 KB

Descript.ion

0.3 KB

BACK7A00.GIF

0.3 KB

BLINE000.GIF

0.1 KB

/.../_CD From Book/CD_Hadi/LIBRARY/SQUARE/

daemen98aes.pdf

1.0 MB

Rijndael.pdf

1.0 MB

rijndael-vals.zip

451.6 KB

daemen97block.pdf

319.6 KB

VR-9700.PDF

281.9 KB

bitsliceDPA.pdf

217.2 KB

PropCorr.pdf

170.0 KB

AESTEST.ZIP

101.2 KB

110.HTM

46.3 KB

IB10.HTM

39.7 KB

rijndael-dos-refc.zip

33.5 KB

CONTESTD.GIF

32.5 KB

CONTESTC.GIF

32.5 KB

CONTESTB.GIF

32.5 KB

AES1.HTM

32.3 KB

9710E.HTM

26.5 KB

9710EF30.GIF

25.1 KB

AES2.HTM

22.8 KB

developer.html

22.5 KB

9710EF20.GIF

19.8 KB

9710EF1.HTM

19.1 KB

9710EF2.HTM

18.6 KB

9710EF3.HTM

18.3 KB

gladman.plus.comcryptography_technologyrijndael.html

17.8 KB

9710EF10.GIF

15.2 KB

BACK3002.GIF

11.9 KB

BACK3001.GIF

11.9 KB

BACK3000.GIF

11.9 KB

BACK3003.GIF

11.9 KB

documentID=13032.html

10.5 KB

F.PDF

8.8 KB

INDEX.HTM

8.2 KB

LOGO_HOM.GIF

3.6 KB

NAV00001.CSS

1.2 KB

NAV00002.CSS

1.2 KB

NAV00003.CSS

1.2 KB

NAV00000.CSS

1.2 KB

LOGO_SMB.GIF

1.0 KB

LOGO_SMA.GIF

1.0 KB

LOGO_SMC.GIF

1.0 KB

LOGO_SMD.GIF

1.0 KB

CMP_whit.gif

1.0 KB

CMP_whiw.gif

1.0 KB

CMP_whiu.gif

1.0 KB

CMP_whiv.gif

1.0 KB

9710EQ30.GIF

0.7 KB

9710EQ31.GIF

0.7 KB

9710EQ11.GIF

0.6 KB

9710EQ10.GIF

0.6 KB

DEFAULT1.CSS

0.5 KB

DEFAULT0.CSS

0.5 KB

DEFAULT2.CSS

0.5 KB

DEFAULT3.CSS

0.5 KB

9710EQ40.GIF

0.4 KB

9710EQ41.GIF

0.4 KB

ENTERBUU.GIF

0.4 KB

ENTERBUT.GIF

0.4 KB

ENTERBUV.GIF

0.4 KB

9710EQ20.GIF

0.3 KB

9710EQ21.GIF

0.3 KB

9710EQ51.GIF

0.3 KB

9710EQ50.GIF

0.3 KB

9710EQ60.GIF

0.2 KB

9710EQ61.GIF

0.2 KB

RHO12001.GIF

0.1 KB

SIGMA120.GIF

0.1 KB

SIGMA121.GIF

0.1 KB

RHO12000.GIF

0.1 KB

GAMMA120.GIF

0.1 KB

GAMMA121.GIF

0.1 KB

PI120001.GIF

0.1 KB

PI120000.GIF

0.1 KB

THETA121.GIF

0.1 KB

THETA120.GIF

0.1 KB

SPACER03.GIF

0.0 KB

SPACER01.GIF

0.0 KB

SPACER06.GIF

0.0 KB

SPACER02.GIF

0.0 KB

SPACER00.GIF

0.0 KB

SPACER05.GIF

0.0 KB

SPACER04.GIF

0.0 KB

/.../_CD From Book/CD_Hadi/LIBRARY/wordlists/

LENGTH08.TXT

1.3 MB

LENGTH07.TXT

1.1 MB

LENGTH06.TXT

907.7 KB

LENGTH05.TXT

583.4 KB

LENGTH04.TXT

315.9 KB

LENGTH03.TXT

106.1 KB

LENGTH02.TXT

4.1 KB

/.../_CD From Book/CD_Hadi/LIBRARY/

FIP180-1.TXT

42.4 KB

RFC2144.TXT

37.5 KB

RFC2202.TXT

11.9 KB

/.../_CD From Book/CD_Hadi/SOURCES/A0/

check_byte_order.ils

3.1 MB

check_byte_order.ilf

917.5 KB

check_byte_order.ilc

393.2 KB

check_byte_order.ild

65.5 KB

check_byte_order.mak

2.2 KB

FEISTEL1.MAK

2.1 KB

check_byte_order.cpp

1.3 KB

FEISTEL1.CPP

1.3 KB

UNIDEF.H

1.0 KB

check_byte_order.dsk

0.9 KB

_CLEAN.BAT

0.0 KB

/.../_CD From Book/CD_Hadi/SOURCES/A1/

FEISTEL.DSK

3.9 KB

FEISTEL.BPR

3.9 KB

FEISTEL1.CPP

1.0 KB

FEISTEL.BPF

0.2 KB

_CLEAN.BAT

0.0 KB

/.../_CD From Book/CD_Hadi/SOURCES/A10/

MAIN.CPP

4.5 KB

T

1.0 KB

/.../_CD From Book/CD_Hadi/SOURCES/A11/

MAIN.CPP

5.7 KB

/.../_CD From Book/CD_Hadi/SOURCES/A2/

SAMPLE1.DOC

11.3 KB

LUCIFER.CPP

3.5 KB

SRC31.DSK

3.1 KB

SRC41.DSK

3.0 KB

SRC31.MAK

2.1 KB

SRC41.MAK

2.1 KB

check_byte_order.cpp

1.3 KB

SRC31.CPP

1.2 KB

UNIDEF.H

1.0 KB

SRC41.CPP

0.9 KB

MAIL1.TXT

0.8 KB

GAMMA1.TXT

0.0 KB

/.../_CD From Book/CD_Hadi/SOURCES/A3/COMPRESS/

acalanthis.cpp

6.2 KB

BITFILE.CPP

1.5 KB

UNIDEF.H

1.0 KB

BITFILE.H

0.4 KB

TEXT.ACC

0.4 KB

_CLEAN.BAT

0.0 KB

/.../_CD From Book/CD_Hadi/SOURCES/A3/SRC/CHAPTER6/

acalanthis.cpp

8.1 KB

BOOK.BPR

2.7 KB

BITFILE.CPP

1.5 KB

P_TABLE.H

1.3 KB

UNIDEF.H

1.0 KB

BITFILE.H

0.4 KB

TEXT.ACC

0.4 KB

org.text.acc

0.3 KB

BOOK.BPF

0.2 KB

_CLEAN.BAT

0.0 KB

TEST.BAT

0.0 KB

/.../_CD From Book/CD_Hadi/SOURCES/A3/SRC/

MINISDK.ZIP

85.2 KB

AHUFFMAN.CPP

8.3 KB

AAC.CPP

5.2 KB

LZ77.CPP

3.9 KB

LUCIFER.CPP

3.5 KB

ACC.BPR

2.8 KB

BITFILE.CPP

1.5 KB

BITFILE.H

0.4 KB

ACC.BPF

0.2 KB

_CLEAN.BAT

0.0 KB

/.../_CD From Book/CD_Hadi/SOURCES/A4/

acalanthis.cpp

8.1 KB

BOOK.BPR

2.7 KB

BITFILE.CPP

1.5 KB

P_TABLE.H

1.3 KB

UNIDEF.H

1.0 KB

BITFILE.H

0.4 KB

TEXT.ACC

0.4 KB

org.text.acc

0.3 KB

BOOK.BPF

0.2 KB

_CLEAN.BAT

0.0 KB

TEST.BAT

0.0 KB

/.../_CD From Book/CD_Hadi/SOURCES/A5/

acalanthis.cpp

8.1 KB

BOOK.BPR

2.7 KB

BITFILE.CPP

1.5 KB

P_TABLE.H

1.3 KB

UNIDEF.H

1.0 KB

BITFILE.H

0.4 KB

TEXT.ACC

0.4 KB

org.text.acc

0.3 KB

BOOK.BPF

0.2 KB

_CLEAN.BAT

0.0 KB

TEST.BAT

0.0 KB

/.../_CD From Book/CD_Hadi/SOURCES/A6/

COLLECT.DOC

66.3 KB

COLLECT.TXT

49.1 KB

ETALON.H

5.4 KB

MAIN.CPP

4.7 KB

FINDKEY.DSK

4.4 KB

FINDKEY.BPR

2.7 KB

UNIDEF.H

1.1 KB

FREQ.PL

0.3 KB

F_ETALON.H

0.2 KB

FINDKEY.BPF

0.2 KB

_CLEAN.BAT

0.0 KB

/.../_CD From Book/CD_Hadi/SOURCES/A7/

COLLECT.TXT

49.1 KB

ALGO.PL

1.1 KB

ALPHA.TXT

0.9 KB

FREQS_C.TXT

0.7 KB

FREQ.PL

0.6 KB

/.../_CD From Book/CD_Hadi/SOURCES/A8/

COLLECT.TXT

49.1 KB

MAIN.CPP

3.8 KB

FINDKEY.BPR

2.7 KB

UNIDEF.H

1.1 KB

/.../_CD From Book/CD_Hadi/SOURCES/A9/

INDEX.WMF

447.1 KB

MAIN.CPP

6.4 KB

/.../_CD From Book/CD_Hadi/SOURCES/BIGNUM/

BNI32.C

112.8 KB

BNPPCASM.H

27.7 KB

BNPRIME.C

22.2 KB

BNSIEVE.C

22.0 KB

BN32.C

20.3 KB

bngermain.c

17.4 KB

bndsaprime.c

16.5 KB

BNIPPC.C

12.0 KB

BNI80386.ASM

10.2 KB

BNI80386.S

9.8 KB

BN.H

7.3 KB

bni80386c.c

5.8 KB

BNI.H

5.1 KB

bni80386c.h

4.7 KB

BNI80386.H

4.6 KB

BNI32.H

4.4 KB

BNIMEM.C

3.1 KB

BNKLUDGE.H

3.0 KB

BN.C

2.5 KB

BNIPPC.H

2.3 KB

BNPRINT.C

2.3 KB

BN32.H

2.2 KB

BNIMEM.H

1.9 KB

BNJACOBI.C

1.7 KB

BNSIZE00.H

1.2 KB

BNSIEVE.H

1.2 KB

BNPRIME.H

0.7 KB

BN00.C

0.5 KB

BNPRINT.H

0.5 KB

BNI00.C

0.5 KB

LBN00.C

0.5 KB

BNINIT32.C

0.5 KB

BNJACOBI.H

0.5 KB

bngermain.h

0.4 KB

BNINIT64.C

0.4 KB

BNINIT16.C

0.4 KB

BNLEGAL.H

0.4 KB

bndsaprime.h

0.3 KB

BNLEGAL.C

0.3 KB

/.../_CD From Book/CD_Hadi/SOURCES/PGPCRACK/VISUAL/

PGPCRK.DSK

3.3 KB

MAIN.CPP

2.0 KB

PGPCRK.MAK

1.8 KB

MAIN.H

1.0 KB

PGPCRK.RES

0.9 KB

MAIN.DFM

0.8 KB

PGPCRK.CPP

0.7 KB

CLEAN.BAT

0.1 KB

/.../_CD From Book/CD_Hadi/SOURCES/PGPCRACK/

BRUISK.ILS

4.9 MB

BRUISK.ILF

2.5 MB

BRUISK.ILC

1.2 MB

BRUISK.ILD

196.6 KB

CAST128.CPP

39.3 KB

MAIN.CPP

5.1 KB

SHA.CPP

4.8 KB

BRUISK.DSK

3.7 KB

BRUISK.BPR

2.7 KB

BRUISK.MAK

2.2 KB

HEAD.TXT

1.6 KB

UNIDEF.H

1.1 KB

MAIN.H

1.1 KB

MAIN.DFM

0.9 KB

BRUISK.RES

0.9 KB

BRUISK.CPP

0.8 KB

CAST128.H

0.7 KB

SHA.H

0.4 KB

CLEAN.BAT

0.1 KB

_CLEAN.BAT

0.0 KB

/.../_CD From Book/CD_Hadi/SOURCES/RC4/

RC4.CPP

1.9 KB

RC4.H

0.4 KB

/.../_CD From Book/CD_Hadi/SOURCES/SCRIPHER/ENCODER/

HEXDUMP.CPP

1.6 KB

ENCODER.CPP

1.6 KB

RC4.CPP

0.9 KB

RC4.H

0.4 KB

MAKEFILE

0.4 KB

HEXDUMP.H

0.2 KB

test.pass

0.0 KB

/.../_CD From Book/CD_Hadi/SOURCES/SCRIPHER/RELEASE/SCRIPHER/

SCRIPHER.SO

9.4 KB

SCRIPHER.PM

0.1 KB

/.../_CD From Book/CD_Hadi/SOURCES/SCRIPHER/RELEASE/TOOLS/

ENCODER

5.3 KB

enveloper

1.1 KB

/.../_CD From Book/CD_Hadi/SOURCES/SCRIPHER/RELEASE/

make_script

0.8 KB

INSTALL

0.3 KB

TEST

0.1 KB

/.../_CD From Book/CD_Hadi/SOURCES/SCRIPHER/

INSTALL

61.4 KB

Makefile.PL

10.2 KB

SCRIPHER.XS

4.6 KB

SCRIPHER.PM

0.1 KB

/.../_CD From Book/CD_Hadi/SOURCES/

CRACK.CPP

208.0 KB

COLLECT.DOC

66.3 KB

COLLECT.TXT

49.1 KB

DES.CPP

19.6 KB

AES.CPP

10.1 KB

DES_SP.H

6.8 KB

MAIN.CPP

5.7 KB

ETALON.H

5.4 KB

GENSP.C

5.3 KB

FINDKEY.DSK

4.8 KB

DES.H

4.7 KB

A5_1.CPP

4.7 KB

DES.DSK

4.5 KB

A5_1.DSK

4.1 KB

crack_bent.dsk

3.8 KB

AES.DSK

3.8 KB

3-WAY.CPP

3.2 KB

AES.BPR

2.9 KB

DES.BPR

2.9 KB

crack_bent.bpr

2.7 KB

FINDKEY.BPR

2.7 KB

A5_1.BPR

2.7 KB

GOST.PL

2.1 KB

UNIDEF.H

1.1 KB

FREQ.PL

0.6 KB

ALGO.PL

0.6 KB

ALPHA.TXT

0.4 KB

T

0.3 KB

crack_bent.bpf

0.2 KB

FINDKEY.BPF

0.2 KB

A5_1.BPF

0.2 KB

DES.BPF

0.2 KB

AES.BPF

0.2 KB

CIPHER.TXT

0.2 KB

DEC.TXT

0.2 KB

_CLEAN.BAT

0.0 KB

F_ETALON.H

0.0 KB

/.../_CD From Book/CD_Hadi/

INDEX.HTM

7.7 KB

TREE.TXT

1.0 KB

FBI.TXT

0.2 KB

/.../_CD From Book/

crypt.rar

196.4 KB

/.../_Hand Book Sourses/

APRCL.C

14.4 KB

GENIRRED.C

13.7 KB

MPQS.C

13.1 KB

POLYFACT.C

12.8 KB

MPDIV.C

11.7 KB

INDEX.C

11.1 KB

GOLDWASS.C

9.6 KB

INTLLL.C

9.1 KB

APRCLGT.C

8.7 KB

POLYEE.C

8.6 KB

PMINONE.C

5.7 KB

DLP.C

5.2 KB

LEHMEREX.C

5.2 KB

GARNER.C

5.1 KB

KNAPSACK.C

4.9 KB

MICALI.C

4.7 KB

MERSENNE.C

4.1 KB

FSROOTS.C

3.9 KB

BLUMBLUM.C

3.8 KB

MPSUB.C

3.7 KB

FBCOMB.C

3.7 KB

EX1001.C

3.3 KB

EX1206.C

3.3 KB

EX0905.C

3.2 KB

SQRTMOD.C

3.2 KB

MPMUL.C

3.2 KB

MONTEXPO.C

3.0 KB

CLEHMER.C

3.0 KB

MPSQR.C

2.8 KB

BINEGCD.C

2.8 KB

BARRETT.C

2.7 KB

MAURER.C

2.7 KB

PRIMEPOW.C

2.6 KB

EX0904.C

2.6 KB

LEHMER.C

2.5 KB

SRK.C

2.5 KB

MLTRKARY.C

2.4 KB

MONTMULT.C

2.3 KB

SWINDOW.C

2.2 KB

MPADD.C

2.1 KB

MASSEY.C

2.0 KB

MONTY.C

1.9 KB

EX0902.C

1.9 KB

MILLER.C

1.8 KB

EX0903.C

1.7 KB

EX0906.C

1.7 KB

GORDON.C

1.7 KB

SOLOVAY.C

1.7 KB

ADDCHAIN.C

1.7 KB

EX0907.C

1.6 KB

LTRKARY.C

1.5 KB

EX1004.C

1.5 KB

EXTEUC.C

1.4 KB

LEHMERCF.C

1.3 KB

FERMAT.C

1.3 KB

REPEAT.C

1.3 KB

EX1203.C

1.1 KB

INVERSE.C

1.1 KB

CBINGCD.C

1.1 KB

EX1202.C

1.0 KB

JACOBI.C

1.0 KB

SDREC.C

1.0 KB

BINGCD.C

0.9 KB

/Base/Исходники/_rijndael/Htxm.files/

Image1.gif

5.0 KB

Image14.gif

4.4 KB

Image3.gif

3.2 KB

Image10.gif

1.3 KB

Image2.gif

1.1 KB

Image6.gif

1.0 KB

Image15.gif

1.0 KB

Image12.gif

1.0 KB

Image17.gif

0.9 KB

Image11.gif

0.9 KB

Image19.gif

0.9 KB

Image13.gif

0.9 KB

Image9.gif

0.9 KB

Image8.gif

0.9 KB

Image16.gif

0.9 KB

Image7.gif

0.9 KB

Image5.gif

0.8 KB

Image4.gif

0.8 KB

Image18.gif

0.8 KB

/Base/Исходники/_rijndael/rijnormsrc/

rijndaeltest-ref.c

21.5 KB

TABLE.256

14.6 KB

TABLE.192

12.5 KB

TABLE.128

10.5 KB

rijndael-alg-ref.c

8.5 KB

rijndael-api-ref.c

8.2 KB

rijndael-api-ref.c.bck

8.1 KB

boxes-ref.dat

5.6 KB

rijndael-api-ref.h

4.1 KB

README

1.4 KB

rijndael-alg-ref.h

0.9 KB

Makefile

0.1 KB

/Base/Исходники/_rijndael/rijoptsrc/

boxes-fst.dat

72.4 KB

rijndaeltest-fst.c

20.4 KB

TABLE.256

14.6 KB

rijndael-alg-fst.c

13.2 KB

TABLE.192

12.5 KB

TABLE.128

10.5 KB

rijndael-api-fst.c

9.3 KB

rijndael-api-fst.h

3.4 KB

README

1.8 KB

rijndael-alg-fst.h

0.8 KB

Makefile

0.4 KB

/Base/Исходники/_rijndael/

RIJSRC.PDF

1.1 MB

Rijndael.htm

27.7 KB

rijndael6.gif

17.7 KB

rijndael7.gif

10.2 KB

rijndael4.gif

7.8 KB

rijndael5.gif

7.4 KB

rijndael1.gif

7.1 KB

rijndael3.gif

6.8 KB

rijndael2.gif

3.0 KB

/Base/Исходники/_НАШ Гост/

28147_89.PDF

550.0 KB

GOST.DOC

523.8 KB

GOST_ALL.ZIP

69.3 KB

GOST32.EXE

44.5 KB

GOST_A32.ZIP

42.7 KB

GOST_SRC.ZIP

33.0 KB

GOST_S32.ZIP

24.6 KB

GOST_UTI.ZIP

22.7 KB

GOST_T32.ZIP

20.2 KB

GOST_TST.ZIP

18.8 KB

GOST386.EXE

16.3 KB

GOST_MES.ZIP

14.5 KB

GOST_L32.ZIP

11.8 KB

/Base/Исходники/_Шифры/

TWOFISH.zip

697.7 KB

/Base/Исходники/Разные ШИФРЫ/

LectureNotesOnCryptography.zip

1.6 MB

feistel.zip

1.1 MB

twofish-doc.zip

613.7 KB

bender.zip

415.5 KB

OpenKey-800-2.txt

346.0 KB

twofish.zip

279.8 KB

elliptic-curves-standard-draft.zip

275.5 KB

fse.zip

271.0 KB

src-083.zip

204.1 KB

ants97.zip

184.1 KB

InformationTheoreticModelForSteganography.zip

168.2 KB

blowfish.zip

164.8 KB

eakd.zip

163.8 KB

seal-doc.zip

130.6 KB

pkcs.zip

129.5 KB

rc6-doc.zip

127.0 KB

frog.zip

124.5 KB

glossary.zip

111.8 KB

tiger-doc.zip

109.3 KB

square.zip

104.7 KB

ice-doc.zip

103.5 KB

DEF.ZIP

93.7 KB

wake.zip

75.6 KB

blcypher.zip

75.4 KB

elliptic.zip

74.3 KB

tr95-03.zip

67.0 KB

idea.zip

65.8 KB

safer.zip

64.2 KB

Handbook_of_Applied_Cryptography_src.zip

63.0 KB

tea-doc.zip

54.1 KB

authent.zip

50.5 KB

luc-public-key.zip

49.5 KB

paper2wd.zip

44.6 KB

sha.zip

44.4 KB

diamond.zip

41.1 KB

cast.zip

40.9 KB

paper4wd.zip

40.7 KB

xtea.zip

37.3 KB

haval.zip

35.0 KB

md4.zip

34.8 KB

sapphire.zip

34.2 KB

des.zip

32.3 KB

luc.c

26.3 KB

rc2.zip

24.2 KB

md5.zip

23.4 KB

xxtea.zip

21.7 KB

loki.zip

21.6 KB

gost.zip

21.2 KB

mars.zip

19.5 KB

tiger.zip

19.1 KB

ripemd.zip

17.4 KB

misty1.zip

16.2 KB

sha1.zip

15.0 KB

SnakeOil.zip

12.2 KB

skipjack.zip

11.7 KB

AN_PROT.ZIP

11.7 KB

scop.zip

11.5 KB

newdes.zip

11.3 KB

rc5.zip

9.7 KB

rc6.zip

8.7 KB

polygonal-pubkey-algorithm.txt

8.4 KB

rc4.zip

7.5 KB

redoc.zip

6.2 KB

dfc.zip

5.3 KB

feal.zip

4.7 KB

seal.zip

3.9 KB

saferplus.zip

3.4 KB

md2.zip

3.2 KB

ice.zip

3.0 KB

e2.zip

2.7 KB

shark.zip

2.3 KB

serpent.zip

2.3 KB

3-way.zip

1.7 KB

tea.zip

1.5 KB

nhash.zip

1.2 KB

/Base/Исходники/

TDelphi - криптопровайдер.mht

493.5 KB

bf_sdk11.zip

99.0 KB

DESASM.C

53.5 KB

BLOWFISH.C

22.7 KB

LUCIFER.C

17.8 KB

MISTY1.C

10.9 KB

CRYP2SRC.RAR

10.6 KB

/Base/Квантовая крипто/Статьи/

Quantum key distribution over 67 km with a plug&play system.pdf

439.3 KB

Квантовая криптография- основы разработки и информационное обеспечение.pdf

202.1 KB

О одном подходе к построению квантовых кодов II.pdf

188.4 KB

О одном подходе к построению квантовых кодов.pdf

184.5 KB

Алгоритм выработки общего ключа с помощью квантового канала связи.pdf

163.5 KB

Квантовая криптография- дорогая игрушка или технология будущего - Винокуров.doc

123.9 KB

Квантовая криптография - Красавин.doc

100.4 KB

Квантовая криптография - Семенов.doc

99.8 KB

О НЕСТОЙКОСТИ КВАНТОВОЙ КРИПТОГРАФИИ - Горшков.doc

24.6 KB

Что не так с классической криптографией.mht

20.1 KB

/Base/Квантовая крипто/

Quantum cryptography (2002) - group of applied phyzics.pdf

1.9 MB

Quantum cryptography (2004) - group of applied phyzics.pdf

1.4 MB

A Quantum Leap for Cryptography.pdf

669.2 KB

Quantum Information Theory and Applications to Quantum Cryptography - Nikolaos P. Papadakos.pdf

409.8 KB

A quick glance at quantum cryptography - Lomonaco S. J.djvu

383.8 KB

Plug and Play quantum cryptography.pdf

155.9 KB

/Base/Криптография/

Dr.Dobb's essential books on cryptography and security (1997).rar

252.0 MB

Работы по теории информации и кибернетике (1963) - Шеннон.pdf

39.7 MB

Fundamentals of cryptology. A professional reference and interactive tutorial.pdf

31.1 MB

Cryptographic Hardware and Embedded Systems (2005) - Springer.pdf

19.3 MB

Modern Cryptography Theory and Practice (2003) - By Wenbo Mao.pdf

18.7 MB

Cryptography Theory And Practice - Douglas Stinson.pdf

17.6 MB

A Computational Introduction To Number Theory And Algebra (2005) - Cambridge University Press.pdf

14.0 MB

Modern Cryptography Protect Your Data with Fast Block Ciphers (2003) -Goots,Izotov,Moldovyan,Moldovya.chm

12.1 MB

Теоретическая криптография - Ростовцев А.Г., Маховенко Е.Б.djvu

10.0 MB

Contemporary Cryptography (2005) - Artech House.pdf

8.0 MB

Handbook of applied cryptography (1997) - Menezes A., van Oorschot P., Vanstone S.djvu

6.6 MB

Прикладная криптография. Использование и синтез криптографических интерфейсов - Щербаков Л.Ю., Домашев А.В.djvu

5.5 MB

Progress On Cryptography. 25 Years Of Cryptography In China (2003) - Kluwer Academic Pub.pdf

5.2 MB

Advances in Elliptic Curve Cryptography (2005) - Cambridge University Press.pdf

4.9 MB

Guide to Elliptic Curve Cryptography - D. Hankerson, A. Menezes, S. Vanstone.pdf

4.6 MB

Cryptography For Dummies (2004) - Cobb.chm

4.2 MB

Cryptographie - Stinson (france).djvu

4.1 MB

An Introduction to Cryptography (2nd ed.) - Mollin R.pdf

4.0 MB

Анализ и синтез криптоалгоритмов (2000) - Грушо,Применко,Тимонина.pdf

4.0 MB

Cryptography.An introduction to computer security.1989 - Sebery J.pdf

3.9 MB

Internet Security. Cryptographic Principles, Algorithms And Protocols (2003) - Man Young Rhee.pdf

3.8 MB

Прикладная криптография - Шнайер Б..pdf

3.5 MB

Complexity and Cryptography An Introduction (2006) - Cambridge University Press.pdf

3.4 MB

A Course In Number Theory And Cryptography (2nd ed.) - Koblitz Neal.djvu

3.4 MB

Applied Cryptography SE Protocols, Algorthms, and Source Code in C (1996) - Bruce Schneier.pdf

3.1 MB

A Computational Introduction To Number Theory and Algebra (2004) - Victor Shoup.pdf

3.0 MB

Ведение в теорию чисел. Алгоритм RSA (2001) - Коутинхо.djvu

2.8 MB

Cryptographic Security. Architecture, Design and Verification - Springer.pdf

2.8 MB

Поточные шифры. Результаты зарубежной открытой криптологии (1997).rar

2.7 MB

BigNum Math. Implementing Cryptographic Multiple Precision Arithmetic (2006) - Denis T., Rose G.djvu

2.5 MB

Теоретико-числовые алгоритмы в криптографии (2003) - Василенко.PDF

2.5 MB

Приложение теории детерминированного хаоса в криптографии (2002) - Птицын.pdf

2.3 MB

Курс теории чисел и криптографии (2001) - Коблиц.djvu

2.3 MB

Lecture Notes on Cryptography (2001) - Goldwasser S., Belare M.pdf

2.0 MB

Основы технологии PKI (2004) - Горбатов B.C., Полянская О.Ю.pdf

2.0 MB

Введение в криптографию - Ященко.djvu

1.8 MB

Криптография с открытым ключом (1995) - Салоома.djvu

1.6 MB

Современная криптология (1999) - Брассар.djvu

1.6 MB

Foundations of Cryptography.pdf

1.5 MB

Основы криптографических алгоритмов (2002) - Гатчин о.Р., Коробейников А.Г.pdf

1.5 MB

Cryptography. A Very Short Intro (2002) - Piper,Murphy.chm

1.4 MB

Codes and Ciphers. Julius Caesar the Enigma and the Internet (2004) - Cambridge University Press.pdf

1.3 MB

Совершенные шифры (2003) - Зубов.rar

1.2 MB

Криптография и компьютерная безопасность - Файстель Х..pdf

1.1 MB

Theorie des nombres et cryptographie (2002) - Arnault F.djvu

1.0 MB

Статьи по криптографии - Сидельников В.М.djvu

992.0 KB

Лекции по арифметическим алгоритмам в криптографии (2002) - Черемушкин.PDF

790.4 KB

Алгоритмические основы эллиптической криптографии - Болотов,Горшков,Фролов,Часовских.pdf

711.4 KB

Cracking DES Secrets of Encryption Research, Wiretap Politics, and Chip Design (1998).pdf

676.5 KB

Some Applications of coding theory in cryptography (2000) - Doumen,Jeroen.pdf

627.0 KB

Coding and Cryptography (1998) - Korner.pdf

517.7 KB

Elementary Number Theory (2003) - Clark W Edwin.pdf

463.4 KB

Основы современной криптографии - Баричев,Серов.djvu

457.4 KB

Криптография без секретов - Баричев.djvu

307.0 KB

Дискретная математика и криптология (2003) - Фомичёв.doc

293.9 KB

Введение в криптографию - Ростовцев.doc

268.3 KB

Generating a Product of Three Primes with an Unknown Factorization.pdf

260.2 KB

/Base/Манулы/

Асимметричный криптографический алгоритм на базе Конечно-Автоматной Модели, Сохраняющей Информацию.doc

3.3 MB

Асимметричный криптографический алгоритм на базе Конечно-Автоматной Модели, Сохраняющей Информацию.pdf

1.4 MB

Однонаправленная функция с «секретом» на базе КАМСИ.pdf

820.2 KB

Алгоритмический подход к квантовой физике.pdf

559.5 KB

Проблема аутентификации данных и блочные шифры - Винокуров.DOC

534.5 KB

О корреляционно-имунных и устойчивых булевых функциях.pdf

484.8 KB

Construction of a pseudo-random generator from any one-way function.pdf

351.7 KB

Методика комплексной оценки рисков утечки информации в корпо.doc

159.7 KB

Основные тенденции развития открытой криптографии.rar

97.0 KB

/Base/Программирование/

net security and cryptography (2003) - Peter Thorsteinson, G. Gnana Arun Ganesh.pdf

11.6 MB

Introduction to Cryptography with Java Applets - Jones & Bartlett Publishers.pdf

10.2 MB

Теория и практика защиты программ - Казарин О.В.pdf

4.0 MB

net security and cryptography (2003) - Peter Thorsteinson, G. Gnana Arun Ganesh.chm

3.3 MB

Programming .NET Security (2003) - Freeman,Jones.chm

2.8 MB

Beginning Cryptography With Java (2005).chm

2.6 MB

Java Cryptography - Knudsen.pdf

1.5 MB

Secure Programming Cookbook for C and C++ (2003) - Messier,Viega.chm

1.4 MB

The laws of cryptography with Java code (2003) - Wagner.ZIP

993.2 KB

Oracle Cryptographic Toolkit Programmer's Guide 2.0.4.pdf

964.8 KB

Java Cryptography (Examples).zip

146.8 KB

/Base/Словари/

DICTSHN.PDF

1.5 MB

Криптографический Словарь.mht

98.2 KB

glossary_2.htm

83.1 KB

Глоссарий криптографических терминов.htm

59.9 KB

GLOSSARY.HTM

31.7 KB

4.html

24.7 KB

Cryptography_Ru Англо-русский и русско-английский словарь криптографических терминов1.htm

22.2 KB

Cryptography_Ru Англо-русский и русско-английский словарь криптографических терминов.htm

21.8 KB

2.html

16.8 KB

5.html

15.9 KB

6.html

14.6 KB

3.html

14.2 KB

1.html

11.1 KB

/.../CHACS PUBLICATIONS.files/

colorline2.gif

0.8 KB

back.gif

0.2 KB

/Base/Ссылки/CHACS PUBLICATIONS/

CHACS PUBLICATIONS.htm

3.0 KB

/.../Cryptography FAQ Index.files/

faqs-org.gif

10.1 KB

/.../Cryptology ePrint Archive/

Cryptology ePrint Archive Search Results.htm

560.1 KB

Cryptology ePrint Archive Complete Contents.htm

329.8 KB

/.../International Cryptography Freedom.files/

show_ads.js

7.0 KB

/Base/Ссылки/proNovell -.files/

style.css

9.0 KB

proNovell.gif

2.9 KB

cnt.gif

0.8 KB

speck.gif

0.0 KB

pixel.gif

0.0 KB

/Base/Ссылки/u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c h.files/

CASL6FMV.htm

7.2 KB

show_ads.js

7.0 KB

crypto.htm

1.0 KB

/Base/Ссылки/u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c h12.files/botonera.files/

corner_perro.jpg

11.2 KB

continua%20otra.jpg

11.0 KB

bot_crypto_min.jpg

4.2 KB

bot_adviso_min.jpg

4.0 KB

bot_products_min.jpg

3.9 KB

bot_exploits_min.jpg

3.8 KB

bot_services_min.jpg

3.6 KB

bot_library_min.jpg

3.5 KB

bot_news_min.jpg

3.5 KB

/Base/Ссылки/u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c h12.files/top.files/realtop.files/

logo_ussr.jpg

16.3 KB

/Base/Ссылки/u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c h12.files/top.files/tree.files/

CAGH23OT.htm

7.0 KB

show_ads.js

7.0 KB

crypto.htm

1.0 KB

/Base/Ссылки/u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c h12.files/top.files/

tree.htm

400.5 KB

realtop.htm

1.3 KB

/Base/Ссылки/u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c h12.files/

botonera.htm

4.5 KB

top.htm

0.8 KB

/.../Index of Crypto Papers Available Online.files/

cover-beyondfear.jpg

10.2 KB

schneier.css

10.1 KB

schneier-safe.css

0.1 KB

/.../Странички криптографов мира и не только/Bruce Schneier/

Index of Crypto Papers Available Online.htm

643.8 KB

/.../Ross Anderson's Home Page.files/

bookcoversmall.jpg

10.9 KB

ross-2006-tiny.jpg

8.6 KB

UoCCL.gif

6.7 KB

new.gif

0.1 KB

/.../Странички криптографов мира и не только/Ross Anderson/

Ross Anderson's Home Page.htm

88.5 KB

/.../Vitaly Shmatikov.files/

updated.gif

0.2 KB

new.gif

0.1 KB

/.../Странички криптографов мира и не только/Vitaly Shmatikov/

Vitaly Shmatikov.htm

22.6 KB

/Base/Ссылки/

u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c h.htm

400.8 KB

Index of Packet Storm Security.htm

261.7 KB

Index of Packet Storm Security1.htm

261.7 KB

Security publications of DIES group members.htm

121.1 KB

Странички криптографов мира в интернете.mht

67.9 KB

Cryptome.htm

61.6 KB

International Cryptography Freedom.htm

58.2 KB

Криптографический ликбез.htm

39.5 KB

proNovell -.htm

36.7 KB

Криптография.htm

35.5 KB

_References_.doc

27.1 KB

Formal Methods.htm

15.5 KB

Cryptography FAQ Index.htm

7.5 KB

Digital Systems Research Center Report 39.htm

3.0 KB

u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c h12.htm

1.9 KB

/Base/Статьи/_FAQ_/

RU.CRYPT FAQ .pdf

153.4 KB

RUCRYPT.txt

86.1 KB

crypt_faq.txt

44.7 KB

Секция 1 из 2.html

33.1 KB

CRC_FAQ.TXT

31.7 KB

FAQ.HTM

19.2 KB

Секция 2 из 2.html

10.5 KB

/Base/Статьи/_Дискретный логарифм/

Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem.PDF

581.5 KB

Assumptions Related to Discrete Logarithms - Why Subtleties Make a Real Difference.pdf

330.8 KB

Cryptography_Ru Дискретное логарифмирование.mht

227.8 KB

Blind Signatures Based on the Discrete Logarithm Problem.PDF

172.8 KB

Логарифмирование через поднятие.PDF

171.8 KB

Частные Фкрма и логарифмирование в мультипликативной группе кольца вычетов по примарному модулю.PDF

137.0 KB

The Discrete Logarithm Problem on Elliptic Curves of Trace One.pdf

120.1 KB

О некотором свойстве дискретного логарифма.PDF

57.4 KB

RSA Laboratories Cryptography FAQ What are the prospects for a theoretical breakthrough in the discret.mht

46.8 KB

RSA Laboratories Cryptography FAQ What are the best discrete logarithm methods in use today.mht

46.6 KB

RSA Laboratories Cryptography FAQ What is the discrete logarithm problem.mht

45.8 KB

/.../Amended Needham Schroeder Symmetric Key.files/

logo-spore.jpg

5.6 KB

/.../BAN modified version of CCITT X.509 (3).files/

logo-spore.jpg

5.6 KB

/.../BAN simplified version of Yahalom.files/

logo-spore.jpg

5.6 KB

/.../CCITT X.509 (1).files/

logo-spore.jpg

5.6 KB

/.../CCITT X.509 (1c).files/

logo-spore.jpg

5.6 KB

/.../CCITT X.509 (3).files/

logo-spore.jpg

5.6 KB

/.../Denning-Sacco shared key.files/

logo-spore.jpg

5.6 KB

/.../Diffie Helman.files/

logo-spore.jpg

5.6 KB

/.../Hwang modified version of Neumann Stubblebine.files/

logo-spore.jpg

5.6 KB

/.../Kerberos V5.files/

logo-spore.jpg

5.6 KB

/.../Lowe modified Denning-Sacco shared key.files/

logo-spore.jpg

5.6 KB

/.../Lowe's fixed version of Needham-Schroder Public Key.files/

logo-spore.jpg

5.6 KB

/.../Lowe's modified version of Yahalom.files/

logo-spore.jpg

5.6 KB

/.../Needham Schroeder Symmetric Key.files/

logo-spore.jpg

5.6 KB

/.../Needham-Schroeder Public Key.files/

logo-spore.jpg

5.6 KB

/.../Neumann Stubblebine.files/

logo-spore.jpg

5.6 KB

/.../Otway Rees.files/

logo-spore.jpg

5.6 KB

/.../Paulson's strengthened version of Yahalom.files/

logo-spore.jpg

5.6 KB

/.../Security Protocols Open Repository.files/

logo-eva.gif

7.1 KB

logo-spore.jpg

5.6 KB

logo-ARTIST2.gif

3.8 KB

logo-lsv.gif

2.8 KB

/.../Woo and Lam Mutual Authentication.files/

logo-spore.jpg

5.6 KB

/.../Woo and Lam Pi 1.files/

logo-spore.jpg

5.6 KB

/.../Woo and Lam Pi 2.files/

logo-spore.jpg

5.6 KB

/.../Woo and Lam Pi 3.files/

logo-spore.jpg

5.6 KB

/.../Woo and Lam Pi f.files/

logo-spore.jpg

5.6 KB

/.../Woo and Lam Pi.files/

logo-spore.jpg

5.6 KB

/Base/Статьи/_Крипто протоколы_/Spore collection/Yahalom.files/

logo-spore.jpg

5.6 KB

/Base/Статьи/_Крипто протоколы_/Spore collection/

Security Protocols Open Repository.htm

25.6 KB

Woo and Lam Mutual Authentication.htm

19.3 KB

Neumann Stubblebine.htm

18.0 KB

BAN simplified version of Yahalom.htm

15.1 KB

CCITT X.509 (3).htm

14.7 KB

Kerberos V5.htm

13.6 KB

Needham-Schroeder Public Key.htm

12.9 KB

Needham Schroeder Symmetric Key.htm

12.0 KB

CCITT X.509 (1).htm

11.4 KB

Diffie Helman.htm

11.1 KB

Otway Rees.htm

10.4 KB

Hwang modified version of Neumann Stubblebine.htm

10.2 KB

Denning-Sacco shared key.htm

9.9 KB

Lowe's fixed version of Needham-Schroder Public Key.htm

9.8 KB

Yahalom.htm

9.4 KB

Amended Needham Schroeder Symmetric Key.htm

9.3 KB

Woo and Lam Pi f.htm

9.2 KB

Paulson's strengthened version of Yahalom.htm

9.0 KB

Lowe's modified version of Yahalom.htm

8.9 KB

Lowe modified Denning-Sacco shared key.htm

8.8 KB

BAN modified version of CCITT X.509 (3).htm

8.5 KB

Woo and Lam Pi.htm

8.4 KB

Woo and Lam Pi 3.htm

8.3 KB

Woo and Lam Pi 2.htm

8.2 KB

Woo and Lam Pi 1.htm

8.1 KB

CCITT X.509 (1c).htm

7.9 KB

/Base/Статьи/_Крипто протоколы_/

Постулаты BAN-логики.rtf

7.3 MB

ТИПИЧНЫЕ ДЕФЕКТЫ В КРИПТОГРАФИЧЕСКИХ ПРОТОКОЛАХ.DOC

674.3 KB

Security and Composition of Multi-party Cryptographic Protocols.ps

585.7 KB

On Symbolic Analysis of Cryptographic Protocols.pdf

517.1 KB

Protocol Vulnerability Analysis (draft).pdf

388.8 KB

Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation.pdf

388.7 KB

Symbolic Protocol Analysis With an Abelian Group Operator or Diffie-Hellman Exponentiation.pdf

312.0 KB

On Modeling IND-CCA Security in Cryptographic Protocols.ps

216.6 KB

Security proofs of cryptographic protocols.pdf

207.7 KB

Efficient Cryptohraphic Protocols based on Noisy Channels.ps

173.5 KB

A HOL Extension of GNY for Automatically Analyzing Cryptographic Protocols.ps

164.2 KB

Криптографические протоколы распределения ключей для групп с динамическим составом участников.doc

151.0 KB

Анализ криптографических протоколов - Сапегин.PDF

128.8 KB

The NRL Protocol Analyzer - An Overview.ps

110.6 KB

Analyzing Internet Security Protocols.pdf

97.6 KB

Finite-State Analysis of SSL 3_0.htm

77.4 KB

АНАЛИЗ КРИПТОГРАФИЧЕСКИХ ПРОТОКОЛОВ.DOC

67.1 KB

Public Key Protocols for Wireless Communications.pdf

55.9 KB

SPEAR a Security Protocol Engineering & Analysis Resource.htm

34.5 KB

Analysis of cryptographic protocols in the formal model.htm

13.1 KB

/.../_Криптоанализ и атаки на шифры_/

Basic Cryptanalysis - FM 34-40-2.rar

8.4 MB

Mod n cryptanalysis, with applications against RC5P and M6 - Schneier,Kelsey.pdf

236.1 KB

Mod n cryptanalysis, with applications against RC5P and M6 - Schneier,Kelsey.ps

228.0 KB

Cryptanalytic Attacks on Pseudorandom Number Generators.pdf

224.4 KB

Related-key attacks against reduced-round Twofish - Schneier,Kelsey.ps

223.0 KB

Related-key attacks against reduced-round Twofish - Schneier,Kelsey.pdf

209.6 KB

Курс самоподготовки по криптоанализу блочных шифров - Шнайер.pdf

177.2 KB

A self-study course in block-cipher cryptanalysis - Schneier.pdf

135.3 KB

Cryptography_Ru Б_ Шнайер_ Курс самоподготовки по криптоанализу блочных шифров (перевод С_ С_ Быбина).mht

89.2 KB

Методы криптоанализа классических шифров.html

58.1 KB

Алгоритм XOR и его взлом.txt

3.2 KB

/.../Традиционные криптографические алгоритмы_files/

letter4.gif

17.3 KB

js

1.4 KB

/Base/Статьи/_Шифры_/

AES Proposal-Rijndael - Daemen,Rijmen.PDF

1.1 MB

Алгоритмы симметричного шифрования.rar

282.3 KB

Как устроен блочный шифр - Винокуров.DOC

228.4 KB

A5.pdf

199.2 KB

Традиционные криптографические алгоритмы.htm

4.5 KB

/Base/Статьи/

Основные понятия в криптографи.pdf

3.0 MB

Integer Factorization Algorithms.rar

2.0 MB

Цикл статей по криптографии - Винокуров.rar

816.5 KB

ПРОСТЫЕ ЧИСЛА В СТРУКТУРЕ НАТУРАЛЬНОГО РЯДА ЧИСЕЛ.pdf

644.1 KB

О минимальной длине ключа для симметричных шифров.PDF

571.7 KB

Теория связи в секретных системах.PDF

527.5 KB

Современная криптология - Брассар.PDF

510.5 KB

Введение в криптосистемы.PDF

490.8 KB

Так или не так действовал Ферма - Кордемский.PDF

484.5 KB

Ханаанский бальзам - Шнайер.PDF

445.0 KB

Side-Channel Resistant Ciphers - Model, Analysis and Design.pdf

441.4 KB

КРИПТОАНАЛИЗ—НАУКА РЕШЕНИЯ ГОЛОВОЛОМОК.pdf

419.6 KB

Quantum information theory and applications to quantum cryptography - Papadakos.pdf

409.8 KB

Криптоанализ и суперкомпьютеры.pdf

392.5 KB

К РАСПРЕДЕЛЕНИЮ ПРОСТЫХ ЧИСЕЛ НА МНОЖЕСТВЕ НАТУРАЛЬНЫХ ЦЕЛЫХ ЧИСЕЛ.pdf

389.5 KB

Protocol Vulnerability Analysis (draft).pdf

388.8 KB

A Survey of Modern Integer Factorization Algorithms.PDF

382.6 KB

A quick glance at quantum cryptography - Lomonaco.pdf

380.0 KB

Отрывок из статьи К. Шеннона «Теория связи в секретных системах».pdf

318.6 KB

Механизмы махинации с подписью в новом российском стандарте ЭЦП ГОСТ 34.19-2001.pdf

277.1 KB

A Logic of Authentication.SRC-039 - Burrows, Abadi, Needhm.pdf

267.1 KB

Проблема P = NP, классы сложностей и криптография - Варновский.pdf

266.5 KB

ГИПОТЕЗА ТАНИЯМЫ И ПОСЛЕДНЯЯ ТЕОРЕМА ФЕРМА - Соловьев.pdf

264.1 KB

Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers.pdf

249.8 KB

PUBLIC-KEY CRYPTOSYSTEM BASED ON ISOGENIES.pdf

242.1 KB

Implementing Cryptographic Pairings on Smartcards.pdf

235.9 KB

Список рекомендуемой литературы для изучающих линейные рекуррентные последовательности.pdf

214.1 KB

Completeness of Formal Hashes in the Standard Model.pdf

213.2 KB

GVG −RP A Net-centric Negligibility-based Security Model for Self-organizing Networks.pdf

209.7 KB

A method for obtaining digital signatures and public-key cyptosystems - RSA.ps

208.8 KB

Симметpичные кpиптосистемы.pdf

182.6 KB

A mathematical theory of communication - Shannon (1948).pdf

171.2 KB

Analyzing the Needham-Schroeder Public Key Protocol.pdf

171.1 KB

Большие подстановки для программных шифров - Ростовцев А.Г..pdf

158.6 KB

Trace Driven Cache Attack on AES.pdf

157.5 KB

Limitations of Logical Analysis of Cryptographic Protocols.pdf

154.9 KB

Подпись вслепую на элептической кривой для электронных денег.PDF

148.4 KB

Rational Secret Sharing, Revisited.pdf

141.6 KB

Blinded Fault Resistant Exponentiation.pdf

136.7 KB

Длина ключа и его полный перебор.pdf

116.8 KB

Криптография и криптоанализ-вековая проблема человечества.pdf

110.5 KB

Подход к созданию трудноанализируемых шифров.doc

106.0 KB

An attack on the Needham-Schroeder Public-Key Authentication Protocol - Gavin Lowe 1995.pdf

100.8 KB

Взлом криптоалгоритмов.mht

87.7 KB

Когда наступит время подбирать ключи.html

65.3 KB

Криптографическиепротоколы распределения ключей для групп с динамическим составом участников.html

56.1 KB

Алгоритм шифрования RSA - описание и общие вопросы.HTM

44.5 KB

Алгоритмы шифрования.mht

39.1 KB

Криптография с открытым ключом.htm

29.9 KB

Аутентификация электронных документов.mht

22.0 KB

NTRU Public Key Cryptosystem Tutorial.htm

20.0 KB

image50.gif

8.8 KB

Генераторы случайных и псевдослучайных последовательностей.txt

3.6 KB

/

КАТАЛОГ.doc

158.3 KB

 

Total files 2083


Copyright © 2024 FileMood.com