BECAUSE of heavy processing requirements, we
are currently using some of your unused brain capacity for
backup processing. Please ignore any hallucinations, voices
or unusual dreams you may experience. Avoid all
concentration-intensive tasks until further notice.
Thank You!~ 
Icon Name Last modified Size Description

[FOLDER] Parent Directory   - Agonizing Memories
[DIR]archives18-Jul-2010 00:15 -  
[DIR]NewsKeyRecoverySVV10.pdf03-Mar-2011 13:10931.64K 
[DIR]00-cnam-cryptographie.pdf03-Feb-2009 20:31199.47Kanalysis algo stegano wordlists
[DIR]007.pdf03-Feb-2009 20:31142.67K 
[DIR]013-jgl.pdf03-Feb-2009 20:31272.30K 
[DIR]0501038.pdf03-Feb-2009 20:31105.31K 
[DIR]061.pdf03-Feb-2009 20:3170.33K 
[DIR]075.pdf03-Feb-2009 20:31126.91K 
[DIR]0764541889.pdf03-Feb-2009 20:31241.14K 
[DIR]126.pdf03-Feb-2009 20:31336.95K 
[DIR]144.pdf03-Feb-2009 20:3180.65K 
[DIR]147.pdf03-Feb-2009 20:31314.35K 
[DIR]148.pdf03-Feb-2009 20:31245.21K 
[DIR]199.pdf03-Feb-2009 20:3156.14K 
[DIR]1995meadows-asiacrypt94.pdf03-Feb-2009 20:31134.47K 
[DIR]2001_goodman_jssc.pdf03-Feb-2009 20:31440.08K 
[DIR]2002_HDRThesis-US.pdf03-Feb-2009 20:311.66M 
[DIR]2004_sac_A4.pdf03-Feb-2009 20:31206.96K 
[DIR]20thCenturyCryptoSpeech.txt03-Feb-2009 20:3125.11K 
[DIR]4.pdf03-Feb-2009 20:31465.58K 
[DIR]AB-9800.pdf03-Feb-2009 20:31232.70K 
[DIR]AES_Algorithm_Efficiency.html03-Feb-2009 20:3171.76KAES Algorithm Efficiency
[DIR]AFP-crypto-liberee.html03-Feb-2009 20:312.00Kanalysis algo stegano wordlists
[DIR]AGPS_01OCFB-paper.pdf03-Feb-2009 20:31279.04K 
[DIR]BRICS-RS-94-38.pdf03-Feb-2009 20:31292.86K 
[DIR]CHJ_02ge.pdf03-Feb-2009 20:31275.08K 
[DIR]CSE-97-15.pdf03-Feb-2009 20:31465.54K 
[DIR]Chap_07.pdf03-Feb-2009 20:31166.70K 
[DIR]Cryptography-1.pdf03-Feb-2009 20:3172.99K 
[DIR]Cryptography-3.pdf03-Feb-2009 20:3172.26K 
[DIR]CypherpunkManifesto.txt03-Feb-2009 20:315.18K 
[DIR]DPA.pdf03-Feb-2009 20:31217.32K 
[DIR]FeteSc.pdf03-Feb-2009 20:31160.38K 
[DIR]Grund_Symmetric-Cryptography_Paper.pdf03-Feb-2009 20:31366.84K 
[DIR]HAVAL_paper.pdf03-Feb-2009 20:31268.11K 
[DIR]I22Diff.pdf03-Feb-2009 20:317.89K 
[DIR]I2_cryptologie.pdf03-Feb-2009 20:3163.83Kanalysis algo stegano wordlists
[DIR]IC_TECH_REPORT_199938.pdf03-Feb-2009 20:31182.95K 
[DIR]IDEA_0304.pdf03-Feb-2009 20:31307.63K 
[DIR]IntroCrypto_fr.pdf03-Feb-2009 20:312.78MTutorials vx en francais
[DIR]LeeShiYinRivestRobshaw-OnPermutationOperationsInCipherDesign.pdf03-Feb-2009 20:31115.43K 
[DIR]LinuxChiffrement.pdf03-Feb-2009 20:31398.72K 
[DIR]NMWd95ca.pdf03-Feb-2009 20:31104.86K 
[DIR]NT.pdf03-Feb-2009 20:31240.45K 
[DIR]Nac95abs.pdf03-Feb-2009 20:3186.89K 
[DIR]PB-472.pdf03-Feb-2009 20:31157.12K 
[DIR]Part_III.pdf03-Feb-2009 20:31520.34K 
[DIR]QC.pdf03-Feb-2009 20:311.80M 
[DIR]RHUL-MA-2001-5.pdf03-Feb-2009 20:31500.60K 
[DIR]RSA02.pdf03-Feb-2009 20:31854.55K 
[DIR]RSA_hardware_implementation.pdf03-Feb-2009 20:31279.13K 
[DIR]RabinCryptosystem.txt03-Feb-2009 20:318.21K 
[DIR]RivestKaliski-RSAProblem.pdf03-Feb-2009 20:3197.18K 
[DIR]SaveVig.pdf03-Feb-2009 20:31476.28K 
[DIR]Simplecrypto.pdf03-Feb-2009 20:3141.63K 
[DIR]SubstGen.pdf03-Feb-2009 20:3179.18K 
[DIR]SurveyAsynchExt.pdf03-Feb-2009 20:31148.82K 
[DIR]The_simple_ideal_cipher_system.pdf03-Feb-2009 20:31103.63K 
[DIR]TuringPres.pdf03-Feb-2009 20:31270.34K 
[DIR]UserAuth.pdf03-Feb-2009 20:31390.47K 
[DIR]Wits00.pdf03-Feb-2009 20:3129.15K 
[DIR]aes-crypto.pdf03-Feb-2009 20:31303.87Kanalysis algo stegano wordlists
[DIR]alibaba.pdf03-Feb-2009 20:31226.79K 
[DIR]andreas3.pdf03-Feb-2009 20:312.30M 
[DIR]arit.pdf03-Feb-2009 20:31202.17K 
[DIR]bear-lion.pdf03-Feb-2009 20:31152.08K 
[DIR]bit_order.pdf03-Feb-2009 20:3165.72K 
[DIR]bsa-final-report.txt03-Feb-2009 20:3128.89K 
[DIR]c.pdf03-Feb-2009 20:3198.65K 
[DIR]cbtwirl.pdf03-Feb-2009 20:31118.33K 
[DIR]cfs.pdf03-Feb-2009 20:3182.48K 
[DIR]cfskey.pdf03-Feb-2009 20:3141.71K 
[DIR]chaffing-and-winnowing.txt03-Feb-2009 20:3125.08K 
[DIR]ches99.pdf03-Feb-2009 20:31181.34K 
[DIR]cmc.pdf03-Feb-2009 20:31750.05K 
[DIR]cocaine-auction-protocol.pdf03-Feb-2009 20:31226.82K 
[DIR]code.pdf03-Feb-2009 20:31197.88K[VM] Explication du code de VM du Linux 2.4
[DIR]concours_aes.pdf03-Feb-2009 20:31470.52KAnalyse des algorithmes finalistes concourant pour le futur standard AES
[DIR]crypt.talk.pdf03-Feb-2009 20:31100.00K 
[DIR]crypto.pdf03-Feb-2009 20:31216.83Kanalysis algo stegano wordlists
[DIR]crypto_mod.pdf03-Feb-2009 20:31173.38Kanalysis algo stegano wordlists
[DIR]crypto_moderne.pdf03-Feb-2009 20:31204.73Kanalysis algo stegano wordlists
[DIR]cryptoanalyse.pdf03-Feb-2009 20:3164.20Kanalysis algo stegano wordlists
[DIR]cryptography_new.pdf03-Feb-2009 20:31219.37Kanalysis algo stegano wordlists
[DIR]cryptosizes.pdf03-Feb-2009 20:31438.23Kanalysis algo stegano wordlists
[DIR]cucs-021-04.pdf03-Feb-2009 20:31130.88K 
[DIR]dean02.pdf03-Feb-2009 20:3193.97K 
[DIR]djalil-crypto.pdf03-Feb-2009 20:31157.32Kanalysis algo stegano wordlists
[DIR]elec6703-2-3.pdf03-Feb-2009 20:3159.52K 
[DIR]esm.pdf03-Feb-2009 20:3160.46K 
[DIR]essay-037.pdf03-Feb-2009 20:3131.24K 
[DIR]examples.pdf03-Feb-2009 20:3137.11K 
[DIR]fawkes.pdf03-Feb-2009 20:31122.05K 
[DIR]fox_ujf.pdf03-Feb-2009 20:31401.57K 
[DIR]fse93.pdf03-Feb-2009 20:3176.90K 
[DIR]fusion.pdf03-Feb-2009 20:31147.55K 
[DIR]gladman.pdf03-Feb-2009 20:3145.12K 
[DIR]herys.pdf03-Feb-2009 20:3110.37K 
[DIR]high-perf-crypto.pdf03-Feb-2009 20:3145.66Kanalysis algo stegano wordlists
[DIR]histoire_cryptographie.pdf03-Feb-2009 20:31215.41Kanalysis algo stegano wordlists
[DIR]inc1.pdf03-Feb-2009 20:31258.61K 
[DIR]inc2.pdf03-Feb-2009 20:31236.62K 
[DIR]inchash.pdf03-Feb-2009 20:31427.08K 
[DIR]internet-modes.pdf03-Feb-2009 20:3162.27K 
[DIR]ipsec.pdf03-Feb-2009 20:31216.47K 
[DIR]katmct.pdf03-Feb-2009 20:3198.45K 
[DIR]key-mngmt-crypto-fs.pdf03-Feb-2009 20:3156.92Kanalysis algo stegano wordlists
[DIR]keyrecovery.pdf03-Feb-2009 20:31169.32K 
[DIR]lars_knudsen.pdf03-Feb-2009 20:31301.41K 
[DIR]lpe.pdf03-Feb-2009 20:31242.45K 
[DIR]marco.pdf03-Feb-2009 20:31232.75K 
[DIR]matrices.pdf03-Feb-2009 20:31120.90K 
[DIR]md5-vs-sha.txt03-Feb-2009 20:314.83K 
[DIR]md5_someday.pdf03-Feb-2009 20:3154.59K 
[DIR]memoire-julien.pdf03-Feb-2009 20:31720.29K 
[DIR]modesv2.pdf03-Feb-2009 20:31117.81K 
[DIR]musee.pdf03-Feb-2009 20:31717.82K 
[DIR]new_introduction_crypto.pdf03-Feb-2009 20:31278.17Kanalysis algo stegano wordlists
[DIR]oakland.pdf03-Feb-2009 20:31263.42K 
[DIR]ocb-full.pdf03-Feb-2009 20:31659.44K 
[DIR]ocf.pdf03-Feb-2009 20:31133.32K 
[DIR]odyssey.pdf03-Feb-2009 20:31120.38K 
[DIR]onetime.pdf03-Feb-2009 20:3150.11K 
[DIR]paper716.pdf03-Feb-2009 20:3175.57K 
[DIR]paper722.pdf03-Feb-2009 20:3133.70K 
[DIR]paper723.pdf03-Feb-2009 20:3130.21K 
[DIR]paper724.pdf03-Feb-2009 20:3185.47K 
[DIR]paper726.pdf03-Feb-2009 20:3146.50K 
[DIR]paper732.pdf03-Feb-2009 20:3132.96K 
[DIR]paper735.pdf03-Feb-2009 20:3133.17K 
[DIR]paper736.pdf03-Feb-2009 20:3138.50K 
[DIR]paper737.pdf03-Feb-2009 20:31100.62K 
[DIR]paper738.pdf03-Feb-2009 20:31134.52K 
[DIR]paper740.pdf03-Feb-2009 20:3140.01KExecutable source code and non-executable source code: analysis and relationships
[DIR]paper751.pdf03-Feb-2009 20:3133.15K 
[DIR]paper764.pdf03-Feb-2009 20:3169.73K 
[DIR]paper768.pdf03-Feb-2009 20:3159.96K 
[DIR]paper874.pdf03-Feb-2009 20:3172.51K 
[DIR]paper878.pdf03-Feb-2009 20:31270.75K 
[DIR]paper879.pdf03-Feb-2009 20:31244.73K 
[DIR]paper885.pdf03-Feb-2009 20:31394.69K 
[DIR]paper886.pdf03-Feb-2009 20:3171.63K 
[DIR]perf.pdf03-Feb-2009 20:31178.96K 
[DIR]pitfalls.pdf03-Feb-2009 20:3155.66K 
[DIR]preprint_frey.pdf03-Feb-2009 20:31336.19KTutorials vx en francais
[DIR]qbsc_2004.pdf03-Feb-2009 20:3162.26K 
[DIR]queensland.pdf03-Feb-2009 20:31202.09K 
[DIR]robustness.pdf03-Feb-2009 20:31123.39K 
[DIR]secret_key_cryptography.pdf03-Feb-2009 20:311.12Manalysis algo stegano wordlists
[DIR]shi_asap00.pdf03-Feb-2009 20:3162.80K 
[DIR]skipjack-kea.pdf03-Feb-2009 20:31213.77K 
[DIR]text.pdf03-Feb-2009 20:3125.51K 
[DIR]thesis-ac.pdf03-Feb-2009 20:31667.61K 
[DIR]thesis.pdf03-Feb-2009 20:311.63M 
[DIR]trapdoor.pdf03-Feb-2009 20:3140.57K 
[DIR]understanding_ssl.pdf03-Feb-2009 20:31265.44K 
[DIR]usenix00.pdf03-Feb-2009 20:31293.43K 
[DIR]wake.pdf03-Feb-2009 20:31150.26K 

Le doute me ronge. Et si tout n'était qu'illusion ? Si rien n'existait ? Dans ce cas, j'aurais payé ma moquette beaucoup trop cher. [Woody Allen]
     \;,._                           _,,-
     \`;, `-._ _..--'''```--.._ __.-',;(
      \ `;,  `:.  ,   ;.   .   :'  .;` /
       ; `;;,      .:    :.      ,;;` /
        \ ';/    \:: :  . ::/    \;` ;
         ).' __.._`        '_..__ `./
         /<  \\ /I`,      ,'I\ //   >
         /\   `;-7/_\ -- /_\7-;'   /\
         //.    `"':" ;; ":`"'     /\
          |/ .  .:' __..__ `.     \|
          /\|: ./. `=_  _=' .\   |/\
             /:(/::.  \/  .::\) /
              ////=-v-'`-v-=\\\\  fL
              ///`Nx_\;;/_xN'\\\
             / /   `"w==w"'   \ \
              /                \