"But I don't want to go among mad people," Alice remarked.
  "Oh, you can't help that," said the Cheshire Cat:
 "we're all mad here. I'm mad. You're mad."
Icon Name Last modified Size Description

[FOLDER] Parent Directory   - Agonizing Memories
[DIR]archives18-Jul-2010 00:15 -  
[DIR]007.pdf03-Feb-2009 20:31142.67K 
[DIR]013-jgl.pdf03-Feb-2009 20:31272.30K 
[DIR]0501038.pdf03-Feb-2009 20:31105.31K 
[DIR]061.pdf03-Feb-2009 20:3170.33K 
[DIR]075.pdf03-Feb-2009 20:31126.91K 
[DIR]0764541889.pdf03-Feb-2009 20:31241.14K 
[DIR]126.pdf03-Feb-2009 20:31336.95K 
[DIR]144.pdf03-Feb-2009 20:3180.65K 
[DIR]147.pdf03-Feb-2009 20:31314.35K 
[DIR]148.pdf03-Feb-2009 20:31245.21K 
[DIR]199.pdf03-Feb-2009 20:3156.14K 
[DIR]1995meadows-asiacrypt94.pdf03-Feb-2009 20:31134.47K 
[DIR]2001_goodman_jssc.pdf03-Feb-2009 20:31440.08K 
[DIR]2002_HDRThesis-US.pdf03-Feb-2009 20:311.66M 
[DIR]2004_sac_A4.pdf03-Feb-2009 20:31206.96K 
[DIR]20thCenturyCryptoSpeech.txt03-Feb-2009 20:3125.11K 
[DIR]4.pdf03-Feb-2009 20:31465.58K 
[DIR]AB-9800.pdf03-Feb-2009 20:31232.70K 
[DIR]AGPS_01OCFB-paper.pdf03-Feb-2009 20:31279.04K 
[DIR]BRICS-RS-94-38.pdf03-Feb-2009 20:31292.86K 
[DIR]CHJ_02ge.pdf03-Feb-2009 20:31275.08K 
[DIR]CSE-97-15.pdf03-Feb-2009 20:31465.54K 
[DIR]Chap_07.pdf03-Feb-2009 20:31166.70K 
[DIR]Cryptography-1.pdf03-Feb-2009 20:3172.99K 
[DIR]Cryptography-3.pdf03-Feb-2009 20:3172.26K 
[DIR]CypherpunkManifesto.txt03-Feb-2009 20:315.18K 
[DIR]DPA.pdf03-Feb-2009 20:31217.32K 
[DIR]FeteSc.pdf03-Feb-2009 20:31160.38K 
[DIR]Grund_Symmetric-Cryptography_Paper.pdf03-Feb-2009 20:31366.84K 
[DIR]HAVAL_paper.pdf03-Feb-2009 20:31268.11K 
[DIR]I22Diff.pdf03-Feb-2009 20:317.89K 
[DIR]IC_TECH_REPORT_199938.pdf03-Feb-2009 20:31182.95K 
[DIR]IDEA_0304.pdf03-Feb-2009 20:31307.63K 
[DIR]LeeShiYinRivestRobshaw-OnPermutationOperationsInCipherDesign.pdf03-Feb-2009 20:31115.43K 
[DIR]LinuxChiffrement.pdf03-Feb-2009 20:31398.72K 
[DIR]NMWd95ca.pdf03-Feb-2009 20:31104.86K 
[DIR]NT.pdf03-Feb-2009 20:31240.45K 
[DIR]Nac95abs.pdf03-Feb-2009 20:3186.89K 
[DIR]NewsKeyRecoverySVV10.pdf03-Mar-2011 13:10931.64K 
[DIR]PB-472.pdf03-Feb-2009 20:31157.12K 
[DIR]Part_III.pdf03-Feb-2009 20:31520.34K 
[DIR]QC.pdf03-Feb-2009 20:311.80M 
[DIR]RHUL-MA-2001-5.pdf03-Feb-2009 20:31500.60K 
[DIR]RSA02.pdf03-Feb-2009 20:31854.55K 
[DIR]RSA_hardware_implementation.pdf03-Feb-2009 20:31279.13K 
[DIR]RabinCryptosystem.txt03-Feb-2009 20:318.21K 
[DIR]RivestKaliski-RSAProblem.pdf03-Feb-2009 20:3197.18K 
[DIR]SaveVig.pdf03-Feb-2009 20:31476.28K 
[DIR]Simplecrypto.pdf03-Feb-2009 20:3141.63K 
[DIR]SubstGen.pdf03-Feb-2009 20:3179.18K 
[DIR]SurveyAsynchExt.pdf03-Feb-2009 20:31148.82K 
[DIR]The_simple_ideal_cipher_system.pdf03-Feb-2009 20:31103.63K 
[DIR]TuringPres.pdf03-Feb-2009 20:31270.34K 
[DIR]UserAuth.pdf03-Feb-2009 20:31390.47K 
[DIR]Wits00.pdf03-Feb-2009 20:3129.15K 
[DIR]alibaba.pdf03-Feb-2009 20:31226.79K 
[DIR]andreas3.pdf03-Feb-2009 20:312.30M 
[DIR]arit.pdf03-Feb-2009 20:31202.17K 
[DIR]bear-lion.pdf03-Feb-2009 20:31152.08K 
[DIR]bit_order.pdf03-Feb-2009 20:3165.72K 
[DIR]bsa-final-report.txt03-Feb-2009 20:3128.89K 
[DIR]c.pdf03-Feb-2009 20:3198.65K 
[DIR]cbtwirl.pdf03-Feb-2009 20:31118.33K 
[DIR]cfs.pdf03-Feb-2009 20:3182.48K 
[DIR]cfskey.pdf03-Feb-2009 20:3141.71K 
[DIR]chaffing-and-winnowing.txt03-Feb-2009 20:3125.08K 
[DIR]ches99.pdf03-Feb-2009 20:31181.34K 
[DIR]cmc.pdf03-Feb-2009 20:31750.05K 
[DIR]cocaine-auction-protocol.pdf03-Feb-2009 20:31226.82K 
[DIR]crypt.talk.pdf03-Feb-2009 20:31100.00K 
[DIR]cucs-021-04.pdf03-Feb-2009 20:31130.88K 
[DIR]dean02.pdf03-Feb-2009 20:3193.97K 
[DIR]elec6703-2-3.pdf03-Feb-2009 20:3159.52K 
[DIR]esm.pdf03-Feb-2009 20:3160.46K 
[DIR]essay-037.pdf03-Feb-2009 20:3131.24K 
[DIR]examples.pdf03-Feb-2009 20:3137.11K 
[DIR]fawkes.pdf03-Feb-2009 20:31122.05K 
[DIR]fox_ujf.pdf03-Feb-2009 20:31401.57K 
[DIR]fse93.pdf03-Feb-2009 20:3176.90K 
[DIR]fusion.pdf03-Feb-2009 20:31147.55K 
[DIR]gladman.pdf03-Feb-2009 20:3145.12K 
[DIR]herys.pdf03-Feb-2009 20:3110.37K 
[DIR]inc1.pdf03-Feb-2009 20:31258.61K 
[DIR]inc2.pdf03-Feb-2009 20:31236.62K 
[DIR]inchash.pdf03-Feb-2009 20:31427.08K 
[DIR]internet-modes.pdf03-Feb-2009 20:3162.27K 
[DIR]ipsec.pdf03-Feb-2009 20:31216.47K 
[DIR]katmct.pdf03-Feb-2009 20:3198.45K 
[DIR]keyrecovery.pdf03-Feb-2009 20:31169.32K 
[DIR]lars_knudsen.pdf03-Feb-2009 20:31301.41K 
[DIR]lpe.pdf03-Feb-2009 20:31242.45K 
[DIR]marco.pdf03-Feb-2009 20:31232.75K 
[DIR]matrices.pdf03-Feb-2009 20:31120.90K 
[DIR]md5-vs-sha.txt03-Feb-2009 20:314.83K 
[DIR]md5_someday.pdf03-Feb-2009 20:3154.59K 
[DIR]memoire-julien.pdf03-Feb-2009 20:31720.29K 
[DIR]modesv2.pdf03-Feb-2009 20:31117.81K 
[DIR]musee.pdf03-Feb-2009 20:31717.82K 
[DIR]oakland.pdf03-Feb-2009 20:31263.42K 
[DIR]ocb-full.pdf03-Feb-2009 20:31659.44K 
[DIR]ocf.pdf03-Feb-2009 20:31133.32K 
[DIR]odyssey.pdf03-Feb-2009 20:31120.38K 
[DIR]onetime.pdf03-Feb-2009 20:3150.11K 
[DIR]paper716.pdf03-Feb-2009 20:3175.57K 
[DIR]paper722.pdf03-Feb-2009 20:3133.70K 
[DIR]paper723.pdf03-Feb-2009 20:3130.21K 
[DIR]paper724.pdf03-Feb-2009 20:3185.47K 
[DIR]paper726.pdf03-Feb-2009 20:3146.50K 
[DIR]paper732.pdf03-Feb-2009 20:3132.96K 
[DIR]paper735.pdf03-Feb-2009 20:3133.17K 
[DIR]paper736.pdf03-Feb-2009 20:3138.50K 
[DIR]paper737.pdf03-Feb-2009 20:31100.62K 
[DIR]paper738.pdf03-Feb-2009 20:31134.52K 
[DIR]paper751.pdf03-Feb-2009 20:3133.15K 
[DIR]paper764.pdf03-Feb-2009 20:3169.73K 
[DIR]paper768.pdf03-Feb-2009 20:3159.96K 
[DIR]paper874.pdf03-Feb-2009 20:3172.51K 
[DIR]paper878.pdf03-Feb-2009 20:31270.75K 
[DIR]paper879.pdf03-Feb-2009 20:31244.73K 
[DIR]paper885.pdf03-Feb-2009 20:31394.69K 
[DIR]paper886.pdf03-Feb-2009 20:3171.63K 
[DIR]perf.pdf03-Feb-2009 20:31178.96K 
[DIR]pitfalls.pdf03-Feb-2009 20:3155.66K 
[DIR]qbsc_2004.pdf03-Feb-2009 20:3162.26K 
[DIR]queensland.pdf03-Feb-2009 20:31202.09K 
[DIR]robustness.pdf03-Feb-2009 20:31123.39K 
[DIR]shi_asap00.pdf03-Feb-2009 20:3162.80K 
[DIR]skipjack-kea.pdf03-Feb-2009 20:31213.77K 
[DIR]text.pdf03-Feb-2009 20:3125.51K 
[DIR]thesis-ac.pdf03-Feb-2009 20:31667.61K 
[DIR]thesis.pdf03-Feb-2009 20:311.63M 
[DIR]trapdoor.pdf03-Feb-2009 20:3140.57K 
[DIR]understanding_ssl.pdf03-Feb-2009 20:31265.44K 
[DIR]usenix00.pdf03-Feb-2009 20:31293.43K 
[DIR]wake.pdf03-Feb-2009 20:31150.26K 
[DIR]AES_Algorithm_Efficiency.html03-Feb-2009 20:3171.76KAES Algorithm Efficiency
[DIR]concours_aes.pdf03-Feb-2009 20:31470.52KAnalyse des algorithmes finalistes concourant pour le futur standard AES
[DIR]paper740.pdf03-Feb-2009 20:3140.01KExecutable source code and non-executable source code: analysis and relationships
[DIR]IntroCrypto_fr.pdf03-Feb-2009 20:312.78MTutorials vx en francais
[DIR]preprint_frey.pdf03-Feb-2009 20:31336.19KTutorials vx en francais
[DIR]code.pdf03-Feb-2009 20:31197.88K[VM] Explication du code de VM du Linux 2.4
[DIR]00-cnam-cryptographie.pdf03-Feb-2009 20:31199.47Kanalysis algo stegano wordlists
[DIR]AFP-crypto-liberee.html03-Feb-2009 20:312.00Kanalysis algo stegano wordlists
[DIR]I2_cryptologie.pdf03-Feb-2009 20:3163.83Kanalysis algo stegano wordlists
[DIR]aes-crypto.pdf03-Feb-2009 20:31303.87Kanalysis algo stegano wordlists
[DIR]crypto.pdf03-Feb-2009 20:31216.83Kanalysis algo stegano wordlists
[DIR]crypto_mod.pdf03-Feb-2009 20:31173.38Kanalysis algo stegano wordlists
[DIR]crypto_moderne.pdf03-Feb-2009 20:31204.73Kanalysis algo stegano wordlists
[DIR]cryptoanalyse.pdf03-Feb-2009 20:3164.20Kanalysis algo stegano wordlists
[DIR]cryptography_new.pdf03-Feb-2009 20:31219.37Kanalysis algo stegano wordlists
[DIR]cryptosizes.pdf03-Feb-2009 20:31438.23Kanalysis algo stegano wordlists
[DIR]djalil-crypto.pdf03-Feb-2009 20:31157.32Kanalysis algo stegano wordlists
[DIR]high-perf-crypto.pdf03-Feb-2009 20:3145.66Kanalysis algo stegano wordlists
[DIR]histoire_cryptographie.pdf03-Feb-2009 20:31215.41Kanalysis algo stegano wordlists
[DIR]key-mngmt-crypto-fs.pdf03-Feb-2009 20:3156.92Kanalysis algo stegano wordlists
[DIR]new_introduction_crypto.pdf03-Feb-2009 20:31278.17Kanalysis algo stegano wordlists
[DIR]secret_key_cryptography.pdf03-Feb-2009 20:311.12Manalysis algo stegano wordlists

L'esprit n'est jamais né, l'esprit ne cessera jamais. Et il n'y eut pas de temps ou il n'était pas. Fin et commencement sont des rêves.
88888888888888888888888888888888888888888888888888888888888888888888888
88.._|      | `-.  | `.  -_-_ _-_  _-  _- -_ -  .'|   |.'|     |  _..88
88   `-.._  |    |`!  |`.  -_ -__ -_ _- _-_-  .'  |.;'   |   _.!-'|  88
88      | `-!._  |  `;!  ;. _______________ ,'| .-' |   _!.i'     |  88
88..__  |     |`-!._ | `.| |_______________||."'|  _!.;'   |     _|..88
88   |``"..__ |    |`";.| i|_|MMMMMMMMMMM|_|'| _!-|   |   _|..-|'    88
88   |      |``--..|_ | `;!|l|MMoMMMMoMMM|1|.'j   |_..!-'|     |     88
88   |      |    |   |`-,!_|_|MMMMP'YMMMM|_||.!-;'  |    |     |     88
88___|______|____!.,.!,.!,!|d|MMMo * loMM|p|,!,.!.,.!..__|_____|_____88
88      |     |    |  |  | |_|MMMMb,dMMMM|_|| |   |   |    |      |  88
88      |     |    |..!-;'i|r|MPYMoMMMMoM|r| |`-..|   |    |      |  88
88      |    _!.-j'  | _!,"|_|M)(MMMMoMMM|_||!._|  `i-!.._ |      |  88
88     _!.-'|    | _."|  !;|1|MbdMMoMMMMM|l|`.| `-._|    |``-.._  |  88
88..-i'     |  _.''|  !-| !|_|MMMoMMMMoMM|_|.|`-. | ``._ |     |``"..88
88   |      |.|    |.|  !| |u|MoMMMMoMMMM|n||`. |`!   | `".    |     88
88   |  _.-'  |  .'  |.' |/|_|MMMMoMMMMoM|_|! |`!  `,.|    |-._|     88
88  _!"'|     !.'|  .'| .'|[@]MMMMMMMMMMM[@] \|  `. | `._  |   `-._  88
88-'    |   .'   |.|  |/| /                 \|`.  |`!    |.|      |`-88
88      |_.'|   .' | .' |/                   \  \ |  `.  | `._    |  88
88     .'   | .'   |/|  /                     \ |`!   |`.|    `.  |  88
88  _.'     !'|   .' | /                       \|  `  |  `.    |`.|  88
88 chattiere point 888888888888888888888888888888888888888888888 fL 888