Pirate
Pirate
Icon  Name                                                                                                             Size  
[PARENTDIR] Parent Directory                                                                                                   -   
[   ] (eBook) Bruce Schneier - Applied Cryptography, Second Edition - John Wiley & Sons [ISBN0471128457].pdf           8.3M  
[   ] Algorithmes de chiffrement par bloc.pdf                                                                          533K  
[   ] Algorithmes de chiffrement symetrique par bloc (DES et AES).pdf                                                  226K  
[   ] Algorithmes et structures de donnees. Initiation au langage CamL.pdf                                             260K  
[   ] Algorithmes sur les graphes.pdf                                                                                  117K  
[   ] An Analysis of LSB & DCT based Steganography.pdf                                                                 704K  
[   ] An Introduction to Cryptography.pdf                                                                              823K  
[   ] Arithmetique.pdf                                                                                                 632K  
[   ] Attaque par factorisation contre RSA.pdf                                                                         574K  
[   ] Basic Cryptanalysis Techniques.pdf                                                                               670K  
[   ] Basic Encryption and Decryption.pdf                                                                              545K  
[   ] Basic cryptanalyse.pdf                                                                                           166K  
[   ] CRYPTANALYSIS OF A CHAOTIC IMAGE ENCRYPTION METHOD.pdf                                                           437K  
[   ] CRYPTOGRAPHIE _Modes operatoires.pdf                                                                             233K  
[   ] Cartes graphiques _ calcul, cryptographie et securite.pdf                                                        136K  
[   ] Chapitre 1 - Intro - L algorithme.pdf                                                                             36K  
[   ] Chiffrement AES 128ou256Bits Seagate.pdf                                                                         265K  
[   ] Chiffrement a clef publique, authentification et distribution des clefs.pdf                                      194K  
[   ] Chiffrer avec RSA.pdf                                                                                             40K  
[   ] Chosen-Ciphertext Attacks on Optimized NTRU.pdf                                                                  150K  
[   ] Cle Publique.pdf                                                                                                 179K  
[   ] Communication Theory of Secrecy Systems.pdf                                                                      734K  
[   ] Confidentialite et cryptographie en entreprise.pdf                                                               818K  
[   ] Cours Sur Les Techniques De Cryptographie - Cnam.pdf                                                              94K  
[   ] Cours individuel de cryptanalyse.pdf                                                                             116K  
[   ] Cryptage et algorithmes.pdf                                                                                      399K  
[   ] Cryptanalyse de certains RSA par les fractions continues et l'algorithme LLL.pdf                                 1.7M  
[   ] Cryptanalyse_faq.pdf                                                                                             1.5M  
[   ] Crypto Key Management System (KMS)- Guide d.administration.pdf                                                   5.8M  
[   ] Crypto militaire.pdf                                                                                             447K  
[   ] Cryptographie Symetrique Asymetrique.pdf                                                                         560K  
[   ] Cryptographie _ de la theorie a la pratique.pdf                                                                  2.2M  
[   ] Cryptographie asymetrique  L exemple de RSA.pdf                                                                  396K  
[   ] Cryptographie avec Bouncy Castle.pdf                                                                             114K  
[   ] Cryptographie elementaire.pdf                                                                                    538K  
[   ] Cryptographie et Cryptanalyse.pdf                                                                                750K  
[   ] Cryptographie evolutionniste.pdf                                                                                  37K  
[   ] Cryptographie quantique-Realisations experimentales.pdf                                                           11M  
[   ] Cryptographie.pdf                                                                                                2.0M  
[   ] Cryptography Theory And Practice - Douglas Stinson.pdf                                                            17M  
[   ] Cryptography and Network Security Principles and Practices, 4th Ed - William Stallings.pdf                        53M  
[   ] Cryptography engineering _ design principles and practical applications.pdf                                      158M  
[   ] Cryptography for Developers - Simon Johnson.pdf                                                                  5.0M  
[   ] Cryptowall_CryptoTunnel_Client_Serveur_FR.pdf                                                                    294K  
[   ] DES.pdf                                                                                                          256K  
[   ] Detection of Hiding in the Least Significant Bit.pdf                                                              94K  
[   ] Distributing the Encryption and Decryption of a Block Cipher.pdf                                                 209K  
[   ] EN - A crack on the glass.pdf                                                                                    1.1M  
[   ] Extension et parallelisation d un algorithme de chiffrement evolutionnaire.pdf                                   124K  
[   ] Fault-Based Attack of RSA Authentication.pdf                                                                     327K  
[   ] Fonctionnement d.AES.pdf                                                                                          55K  
[   ] Fonctions de hachage.pdf                                                                                         191K  
[   ] Fourier Analysis.pdf                                                                                             269K  
[   ] Fournitures necessaires a l.analyse de mecanismes cryptographiques.pdf                                           370K  
[   ] HSC - Introduction a la cryptographie.pdf                                                                        576K  
[   ] Handbook of Applied Cryptography (Crc Press Series on Discrete Mathematics and Its Applications) 5th Edition.pdf 5.5M  
[   ] Handbook of Applied Cryptography - Alfred J. Menezes.pdf                                                         4.6M  
[   ] Histoire de la Cryptographie.pdf                                                                                 6.2M  
[   ] INTRODUCTION TO CRYPTOGRAPHY WITH JAVA APPLETS - DAVID BISHOP.pdf                                                9.7M  
[   ] Image and Video Encryption From Digital Rights Management to Secured Personal Communication - Sushil Jajodia.pdf 7.7M  
[   ] Imperfect Decryption and an Attack on the NTRU Encryption Scheme.pdf                                             230K  
[   ] Implementation and Analysis of several Public-Key Encryption Algorithms.pdf                                      214K  
[   ] Implementation d une table de hachage parallele.pdf                                                              344K  
[   ] Information noyee, information cachee.pdf                                                                        199K  
[   ] Introduction a la cryptographie quantique et au calcul quantique.pdf                                             1.2M  
[   ] Introduction a la cryptographie.pdf                                                                              2.4M  
[   ] Introduction aux codes secrets.pdf                                                                                67K  
[   ] Introduction to Modern Cryptography.pdf                                                                          5.6M  
[   ] Keyczar_ A Cryptographic Toolkit.pdf                                                                             112K  
[   ] La division euclidienne.pdf                                                                                       27K  
[   ] La methode RSA et la cryptographie fondee sur les courbes elliptiques.pdf                                        430K  
[   ] Le Polymorphisme Cryptographique.pdf                                                                             368K  
[   ] Le chiffrement par cle publique.pdf                                                                              295K  
[   ] Le format JPEG en steganographie.pdf                                                                             396K  
[   ] Learn Encryption Techniques with BASIC and C++ - Gil Held.chm                                                    2.8M  
[   ] Lecture Notes on Cryptography.pdf                                                                                1.5M  
[   ] Les algorithmes de base du graphisme.pdf                                                                         107K  
[   ] Les risques reseaux , chiffrements , services ... .pdf                                                           455K  
[   ] Les_algorithmes_cryptographiques.pdf                                                                             155K  
[   ] Les_supports_physiques_de_transmission_le_cable_a_paires_torsadees.pdf                                           719K  
[   ] Linear Cryptanalysis of DES.pdf                                                                                  1.0M  
[   ] Military Cryptanalysis.pdf                                                                                        48M  
[   ] Modern Cryptography Theory and Practice - Wenbo Mao.chm                                                          3.2M  
[   ] Modern Cryptography Theory and Practice - Wenbo Mao.pdf                                                           18M  
[   ] OAEP  Optimal Asymmetric Encryption Padding- TD - fr.pdf                                                         108K  
[   ] Oech03.pdf                                                                                                       237K  
[   ] PKCS 1 v2.1 - RSA Cryptography Standard.pdf                                                                      172K  
[   ] PROGRESS ON CRYPTOGRAPHY 25 Years of Cryptography in China - Kefei Chen.pdf                                      5.0M  
[   ] Pass The Hash.pdf                                                                                                137K  
[   ] Primalite et factorisation  les cles de RSA.pdf                                                                  1.3M  
[   ] Principes et algo de crypto OpenSSL.pdf                                                                          172K  
[   ] Projet Matlab _ un logiciel de cryptage.pdf                                                                      1.1M  
[   ] Projet de cryptographie-Cassage mot de passe Windows et Linux.pdf                                                467K  
[   ] Proofs of Security for Password-Based Key Exchange (IEEE P1363 AuthA Protocol and Extensions).pdf                276K  
[   ] Public Electronic Contract Protocol.pdf                                                                          1.1M  
[   ] RSA  Rivest Shamir Adleman.pdf                                                                                   938K  
[   ] RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.pdf                                                  7.7M  
[   ] RSA.pdf                                                                                                           83K  
[   ] Reconstructing the Cryptanalytic Attack behind the Flame Malware.pdf                                             833K  
[   ] Reperes RSA-1.pdf                                                                                                556K  
[   ] Secure Network Communication Public Key Cryptography.pdf                                                         203K  
[   ] Security Flaws Induced by CBC Padding Applications to SSL, IPSEC, WTLS....pdf                                    126K  
[   ] Steganographie _ techniques.pdf                                                                                  1.2M  
[   ] Sur l algorithme RSA.pdf                                                                                         126K  
[   ] TRUECRYPT FREE OPEN-SOURCE ON-THE-FLY ENCRYPTION USER.S GUIDE.pdf                                                844K  
[   ] Techniques Obfuscation De Code. Chiffrer Du Clair Avec Du Clair.pdf                                              323K  
[   ] The CodeBreakers - Kahn David.pdf                                                                                1.4M  
[   ] The RC5 Encryption Algorithm.pdf                                                                                 175K  
[   ] Theorie de l information et codage-Master de Cryptographie.pdf                                                   409K  
[   ] Transparent-algorithmes.pdf                                                                                      369K  
[   ] Une introduction a la cryptographie  - asymetrique.pdf                                                           1.1M  
[   ] X509.pdf                                                                                                         258K  
[   ] analyseVigenere.pdf                                                                                               45K  
[   ] codebook_solution.pdf                                                                                            325K  
[   ] crypto.pdf                                                                                                       208K  
[   ] crypto_quant.pdf                                                                                                 911K  
[   ] cryptographie-2.pdf                                                                                              618K  
[   ] cryptoq.pdf                                                                                                      194K  
[   ] pkey.pdf                                                                                                         278K  
[   ] stega.pdf                                                                                                         83K  
[   ] vigenere.pdf                                                                                                     4.8M  
email feed
Copyright © 2013-2018 - index-of.es