Name Size
Parent Directory -
(eBook) Bruce Schneier - Applied Cryptography, Second Edition - John Wiley & Sons [ISBN0471128457].pdf 8.3M
A Cryptographic File System for Unix.pdf 82K
Algorithmes de chiffrement par bloc.pdf 533K
Algorithmes de chiffrement symetrique par bloc (DES et AES).pdf 226K
Algorithmes et structures de donnees. Initiation au langage CamL.pdf 260K
Algorithmes sur les graphes.pdf 117K
An Analysis of LSB & DCT based Steganography.pdf 704K
An Introduction to Cryptography (2).pdf 823K
An Introduction to Cryptography.pdf 1.2M
Arithmetique.pdf 632K
Attacking_NTLM_with_precomputed_hashtables.pdf 119K
Attaque par factorisation contre RSA.pdf 574K
Basic Cryptanalysis Techniques.pdf 670K
Basic Encryption and Decryption.pdf 545K
Basic cryptanalyse.pdf 166K
CRYPTANALYSIS OF A CHAOTIC IMAGE ENCRYPTION METHOD.pdf 437K
CRYPTOGRAPHIE _Modes operatoires.pdf 233K
Cartes graphiques _ calcul, cryptographie et securite.pdf 136K
Chapitre 1 - Intro - L algorithme.pdf 36K
Chiffrement AES 128ou256Bits Seagate.pdf 265K
Chiffrement a clef publique, authentification et distribution des clefs.pdf 194K
Chiffrer avec RSA.pdf 40K
Chosen-Ciphertext Attacks on Optimized NTRU.pdf 150K
Cle Publique.pdf 179K
Communication Theory of Secrecy Systems.pdf 734K
Confidentialite et cryptographie en entreprise.pdf 818K
Cours Sur Les Techniques De Cryptographie - Cnam.pdf 94K
Cours individuel de cryptanalyse.pdf 116K
Cryptage et algorithmes.pdf 399K
Cryptanalyse de certains RSA par les fractions continues et l'algorithme LLL.pdf 1.7M
Cryptanalyse_faq.pdf 1.5M
Crypto Key Management System (KMS)- Guide d.administration.pdf 5.8M
Crypto militaire.pdf 447K
CryptoBench User's Guide.pdf 119K
Cryptographie Symetrique Asymetrique.pdf 560K
Cryptographie _ de la theorie a la pratique.pdf 2.2M
Cryptographie asymetrique L exemple de RSA.pdf 396K
Cryptographie avec Bouncy Castle.pdf 114K
Cryptographie elementaire.pdf 538K
Cryptographie et Cryptanalyse.pdf 750K
Cryptographie evolutionniste.pdf 37K
Cryptographie quantique-Realisations experimentales.pdf 11M
Cryptographie.pdf 2.0M
Cryptography Theory And Practice - Douglas Stinson.pdf 17M
Cryptography and Network Security Principles and Practices, 4th Ed - William Stallings.pdf 53M
Cryptography engineering _ design principles and practical applications.pdf 158M
Cryptography for Developers - Simon Johnson.pdf 5.0M
Cryptowall_CryptoTunnel_Client_Serveur_FR.pdf 294K
D1T2 - Skyper - Cracking the GSM A5_1 Encryption in Seconds.pdf 3.4M
DATA ENCRYPTION STANDARD - DES.pdf 179K
DES (2).pdf 256K
DES.pdf 59K
Detection of Hiding in the Least Significant Bit.pdf 94K
Distributing the Encryption and Decryption of a Block Cipher.pdf 209K
EN - A crack on the glass.pdf 1.1M
EN- Serpent_ A Proposal for the Advanced Encryption Standard.pdf 173K
EN-Attacking unbalanced RSA-CRT using SPA.pdf 301K
EN-Attacks on Steganographic Systems.pdf 964K
EN-Cryptanalyse Md4.pdf 159K
EN-Crypto.pdf 191K
EN-Crypto2.pdf 174K
EN-DETECTING HIDDEN MESSAGES USING HIGHER-ORDER STATISTICAL MODELS.pdf 167K
EN-Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines.pdf 495K
EN-Detecting Steganographic Content on the Internet.pdf 821K
EN-Detecting Steganographic Messages in Digital Images.pdf 602K
EN-Exploring Steganography_ Seeing the Unseen.pdf 2.3M
EN-On The Limits of Steganography.pdf 156K
EN-Securing applications.pdf 955K
EN-Syndrome Decoding in the Non-Standard Cases.pdf 237K
EN-Weaknesses in the Key Scheduling Algorithm of RC4.pdf 297K
Extension et parallelisation d un algorithme de chiffrement evolutionnaire.pdf 124K
FUNDAMENTALS OF CRYPTOLOGY.pdf 2.9M
Fault-Based Attack of RSA Authentication.pdf 327K
Fonctionnement d.AES.pdf 55K
Fonctions de hachage.pdf 191K
Fourier Analysis.pdf 269K
Fournitures necessaires a l.analyse de mecanismes cryptographiques.pdf 370K
Fundamentals of Cryptography.pdf 339K
Fundamentals_Cryptography_Encryption.pdf 737K
HSC - Introduction a la cryptographie.pdf 576K
Handbook of Applied Cryptography (Crc Press Series on Discrete Mathematics and Its Applications) 5th Edition.pdf 5.5M
Handbook of Applied Cryptography - Alfred J. Menezes.pdf 4.6M
Histoire de la Cryptographie.pdf 6.2M
How to Break MD5 and Other Hash Functions.pdf 240K
INTRODUCTION TO CRYPTOGRAPHY WITH JAVA APPLETS - DAVID BISHOP.pdf 9.7M
Image and Video Encryption From Digital Rights Management to Secured Personal Communication - Sushil Jajodia.pdf 7.7M
Imperfect Decryption and an Attack on the NTRU Encryption Scheme.pdf 230K
Implementation and Analysis of several Public-Key Encryption Algorithms.pdf 214K
Implementation d une table de hachage parallele.pdf 344K
Improved Collision Attack on MD5.pdf 160K
Information Hiding A Survey.pdf 3.3M
Information noyee, information cachee.pdf 199K
IntroToCrypto.pdf 1.1M
Introduction a la cryptographie quantique et au calcul quantique.pdf 1.2M
Introduction a la cryptographie.pdf 2.4M
Introduction aux codes secrets.pdf 67K
Introduction to Modern Cryptography.pdf 5.6M
Keyczar_ A Cryptographic Toolkit.pdf 112K
La division euclidienne.pdf 27K
La methode RSA et la cryptographie fondee sur les courbes elliptiques.pdf 430K
Le Polymorphisme Cryptographique.pdf 368K
Le chiffrement par cle publique.pdf 295K
Le format JPEG en steganographie.pdf 396K
Learn Encryption Techniques with BASIC and C++ - Gil Held.chm 2.8M
Lecture Notes on Cryptography.pdf 1.5M
Les algorithmes de base du graphisme.pdf 107K
Les risques reseaux , chiffrements , services ... .pdf 455K
Les_algorithmes_cryptographiques.pdf 155K
Les_supports_physiques_de_transmission_le_cable_a_paires_torsadees.pdf 719K
Linear Cryptanalysis of DES.pdf 1.0M
MD5 Collisions.pdf 217K
Military Cryptanalysis.pdf 48M
Modern Cryptography Theory and Practice - Wenbo Mao.chm 3.2M
Modern Cryptography Theory and Practice - Wenbo Mao.pdf 18M
Monoalphabetic Unilateral Subtition System.pdf 136K
OAEP Optimal Asymmetric Encryption Padding- TD - fr.pdf 108K
Oech03.pdf 237K
PKCS 1 v2.1 - RSA Cryptography Standard.pdf 172K
PROGRESS ON CRYPTOGRAPHY 25 Years of Cryptography in China - Kefei Chen.pdf 5.0M
Pass The Hash.pdf 137K
Primalite et factorisation les cles de RSA.pdf 1.3M
Principes et algo de crypto OpenSSL.pdf 172K
Projet Matlab _ un logiciel de cryptage.pdf 1.1M
Projet de cryptographie-Cassage mot de passe Windows et Linux.pdf 467K
Proofs of Security for Password-Based Key Exchange (IEEE P1363 AuthA Protocol and Extensions).pdf 276K
Public Electronic Contract Protocol.pdf 1.1M
RSA Rivest Shamir Adleman.pdf 938K
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.pdf 7.7M
RSA.pdf 83K
Reconstructing the Cryptanalytic Attack behind the Flame Malware.pdf 833K
Reperes RSA-1.pdf 556K
Secure Network Communication Public Key Cryptography.pdf 203K
Security Flaws Induced by CBC Padding Applications to SSL, IPSEC, WTLS....pdf 126K
Steganographie _ techniques.pdf 1.2M
Sur l algorithme RSA.pdf 126K
TRUECRYPT FREE OPEN-SOURCE ON-THE-FLY ENCRYPTION USER.S GUIDE.pdf 844K
Techniques Obfuscation De Code. Chiffrer Du Clair Avec Du Clair.pdf 323K
The CodeBreakers - Kahn David.pdf 1.4M
The DES Algorithm Illustrated.pdf 88K
The MD5 Message-Digest Algorithm.pdf 44K
The RC5 Encryption Algorithm.pdf 175K
Theorie de l information et codage-Master de Cryptographie.pdf 409K
Transparent-algorithmes.pdf 369K
Une introduction a la cryptographie - asymetrique.pdf 1.1M
X509.pdf 258K
analyseVigenere.pdf 45K
codebook_solution.pdf 325K
crypto.pdf 208K
crypto_quant.pdf 911K
cryptographie-2.pdf 618K
cryptointro.pdf 891K
cryptoq.pdf 194K
defeating_encryption.pdf 491K
diffiehellman.pdf 260K
dsg.pdf 422K
pkey.pdf 278K
stega.pdf 83K
thesis.pdf 524K
vigenere.pdf 4.8M