'C'est la preuve absolue de l'efficacite de la videosurveillance...'
-- Franck Timmermans, secretaire du MNR de Bruno Megret, a` propos de Loft Story...
Icon Name Last modified Size Description

[FOLDER] Parent Directory   - Agonizing Memories
[DIR]archives18-Jul-2010 00:15 -  
[DIR]wake.pdf03-Feb-2009 20:31150.26K 
[DIR]usenix00.pdf03-Feb-2009 20:31293.43K 
[DIR]understanding_ssl.pdf03-Feb-2009 20:31265.44K 
[DIR]trapdoor.pdf03-Feb-2009 20:3140.57K 
[DIR]thesis.pdf03-Feb-2009 20:311.63M 
[DIR]thesis-ac.pdf03-Feb-2009 20:31667.61K 
[DIR]text.pdf03-Feb-2009 20:3125.51K 
[DIR]skipjack-kea.pdf03-Feb-2009 20:31213.77K 
[DIR]shi_asap00.pdf03-Feb-2009 20:3162.80K 
[DIR]secret_key_cryptography.pdf03-Feb-2009 20:311.12Manalysis algo stegano wordlists
[DIR]robustness.pdf03-Feb-2009 20:31123.39K 
[DIR]queensland.pdf03-Feb-2009 20:31202.09K 
[DIR]qbsc_2004.pdf03-Feb-2009 20:3162.26K 
[DIR]preprint_frey.pdf03-Feb-2009 20:31336.19KTutorials vx en francais
[DIR]pitfalls.pdf03-Feb-2009 20:3155.66K 
[DIR]perf.pdf03-Feb-2009 20:31178.96K 
[DIR]paper886.pdf03-Feb-2009 20:3171.63K 
[DIR]paper885.pdf03-Feb-2009 20:31394.69K 
[DIR]paper879.pdf03-Feb-2009 20:31244.73K 
[DIR]paper878.pdf03-Feb-2009 20:31270.75K 
[DIR]paper874.pdf03-Feb-2009 20:3172.51K 
[DIR]paper768.pdf03-Feb-2009 20:3159.96K 
[DIR]paper764.pdf03-Feb-2009 20:3169.73K 
[DIR]paper751.pdf03-Feb-2009 20:3133.15K 
[DIR]paper740.pdf03-Feb-2009 20:3140.01KExecutable source code and non-executable source code: analysis and relationships
[DIR]paper738.pdf03-Feb-2009 20:31134.52K 
[DIR]paper737.pdf03-Feb-2009 20:31100.62K 
[DIR]paper736.pdf03-Feb-2009 20:3138.50K 
[DIR]paper735.pdf03-Feb-2009 20:3133.17K 
[DIR]paper732.pdf03-Feb-2009 20:3132.96K 
[DIR]paper726.pdf03-Feb-2009 20:3146.50K 
[DIR]paper724.pdf03-Feb-2009 20:3185.47K 
[DIR]paper723.pdf03-Feb-2009 20:3130.21K 
[DIR]paper722.pdf03-Feb-2009 20:3133.70K 
[DIR]paper716.pdf03-Feb-2009 20:3175.57K 
[DIR]onetime.pdf03-Feb-2009 20:3150.11K 
[DIR]odyssey.pdf03-Feb-2009 20:31120.38K 
[DIR]ocf.pdf03-Feb-2009 20:31133.32K 
[DIR]ocb-full.pdf03-Feb-2009 20:31659.44K 
[DIR]oakland.pdf03-Feb-2009 20:31263.42K 
[DIR]new_introduction_crypto.pdf03-Feb-2009 20:31278.17Kanalysis algo stegano wordlists
[DIR]musee.pdf03-Feb-2009 20:31717.82K 
[DIR]modesv2.pdf03-Feb-2009 20:31117.81K 
[DIR]memoire-julien.pdf03-Feb-2009 20:31720.29K 
[DIR]md5_someday.pdf03-Feb-2009 20:3154.59K 
[DIR]md5-vs-sha.txt03-Feb-2009 20:314.83K 
[DIR]matrices.pdf03-Feb-2009 20:31120.90K 
[DIR]marco.pdf03-Feb-2009 20:31232.75K 
[DIR]lpe.pdf03-Feb-2009 20:31242.45K 
[DIR]lars_knudsen.pdf03-Feb-2009 20:31301.41K 
[DIR]keyrecovery.pdf03-Feb-2009 20:31169.32K 
[DIR]key-mngmt-crypto-fs.pdf03-Feb-2009 20:3156.92Kanalysis algo stegano wordlists
[DIR]katmct.pdf03-Feb-2009 20:3198.45K 
[DIR]ipsec.pdf03-Feb-2009 20:31216.47K 
[DIR]internet-modes.pdf03-Feb-2009 20:3162.27K 
[DIR]inchash.pdf03-Feb-2009 20:31427.08K 
[DIR]inc2.pdf03-Feb-2009 20:31236.62K 
[DIR]inc1.pdf03-Feb-2009 20:31258.61K 
[DIR]histoire_cryptographie.pdf03-Feb-2009 20:31215.41Kanalysis algo stegano wordlists
[DIR]high-perf-crypto.pdf03-Feb-2009 20:3145.66Kanalysis algo stegano wordlists
[DIR]herys.pdf03-Feb-2009 20:3110.37K 
[DIR]gladman.pdf03-Feb-2009 20:3145.12K 
[DIR]fusion.pdf03-Feb-2009 20:31147.55K 
[DIR]fse93.pdf03-Feb-2009 20:3176.90K 
[DIR]fox_ujf.pdf03-Feb-2009 20:31401.57K 
[DIR]fawkes.pdf03-Feb-2009 20:31122.05K 
[DIR]examples.pdf03-Feb-2009 20:3137.11K 
[DIR]essay-037.pdf03-Feb-2009 20:3131.24K 
[DIR]esm.pdf03-Feb-2009 20:3160.46K 
[DIR]elec6703-2-3.pdf03-Feb-2009 20:3159.52K 
[DIR]djalil-crypto.pdf03-Feb-2009 20:31157.32Kanalysis algo stegano wordlists
[DIR]dean02.pdf03-Feb-2009 20:3193.97K 
[DIR]cucs-021-04.pdf03-Feb-2009 20:31130.88K 
[DIR]cryptosizes.pdf03-Feb-2009 20:31438.23Kanalysis algo stegano wordlists
[DIR]cryptography_new.pdf03-Feb-2009 20:31219.37Kanalysis algo stegano wordlists
[DIR]cryptoanalyse.pdf03-Feb-2009 20:3164.20Kanalysis algo stegano wordlists
[DIR]crypto_moderne.pdf03-Feb-2009 20:31204.73Kanalysis algo stegano wordlists
[DIR]crypto_mod.pdf03-Feb-2009 20:31173.38Kanalysis algo stegano wordlists
[DIR]crypto.pdf03-Feb-2009 20:31216.83Kanalysis algo stegano wordlists
[DIR]crypt.talk.pdf03-Feb-2009 20:31100.00K 
[DIR]concours_aes.pdf03-Feb-2009 20:31470.52KAnalyse des algorithmes finalistes concourant pour le futur standard AES
[DIR]code.pdf03-Feb-2009 20:31197.88K[VM] Explication du code de VM du Linux 2.4
[DIR]cocaine-auction-protocol.pdf03-Feb-2009 20:31226.82K 
[DIR]cmc.pdf03-Feb-2009 20:31750.05K 
[DIR]ches99.pdf03-Feb-2009 20:31181.34K 
[DIR]chaffing-and-winnowing.txt03-Feb-2009 20:3125.08K 
[DIR]cfskey.pdf03-Feb-2009 20:3141.71K 
[DIR]cfs.pdf03-Feb-2009 20:3182.48K 
[DIR]cbtwirl.pdf03-Feb-2009 20:31118.33K 
[DIR]c.pdf03-Feb-2009 20:3198.65K 
[DIR]bsa-final-report.txt03-Feb-2009 20:3128.89K 
[DIR]bit_order.pdf03-Feb-2009 20:3165.72K 
[DIR]bear-lion.pdf03-Feb-2009 20:31152.08K 
[DIR]arit.pdf03-Feb-2009 20:31202.17K 
[DIR]andreas3.pdf03-Feb-2009 20:312.30M 
[DIR]alibaba.pdf03-Feb-2009 20:31226.79K 
[DIR]aes-crypto.pdf03-Feb-2009 20:31303.87Kanalysis algo stegano wordlists
[DIR]Wits00.pdf03-Feb-2009 20:3129.15K 
[DIR]UserAuth.pdf03-Feb-2009 20:31390.47K 
[DIR]TuringPres.pdf03-Feb-2009 20:31270.34K 
[DIR]The_simple_ideal_cipher_system.pdf03-Feb-2009 20:31103.63K 
[DIR]SurveyAsynchExt.pdf03-Feb-2009 20:31148.82K 
[DIR]SubstGen.pdf03-Feb-2009 20:3179.18K 
[DIR]Simplecrypto.pdf03-Feb-2009 20:3141.63K 
[DIR]SaveVig.pdf03-Feb-2009 20:31476.28K 
[DIR]RivestKaliski-RSAProblem.pdf03-Feb-2009 20:3197.18K 
[DIR]RabinCryptosystem.txt03-Feb-2009 20:318.21K 
[DIR]RSA_hardware_implementation.pdf03-Feb-2009 20:31279.13K 
[DIR]RSA02.pdf03-Feb-2009 20:31854.55K 
[DIR]RHUL-MA-2001-5.pdf03-Feb-2009 20:31500.60K 
[DIR]QC.pdf03-Feb-2009 20:311.80M 
[DIR]Part_III.pdf03-Feb-2009 20:31520.34K 
[DIR]PB-472.pdf03-Feb-2009 20:31157.12K 
[DIR]NewsKeyRecoverySVV10.pdf03-Mar-2011 13:10931.64K 
[DIR]Nac95abs.pdf03-Feb-2009 20:3186.89K 
[DIR]NT.pdf03-Feb-2009 20:31240.45K 
[DIR]NMWd95ca.pdf03-Feb-2009 20:31104.86K 
[DIR]LinuxChiffrement.pdf03-Feb-2009 20:31398.72K 
[DIR]LeeShiYinRivestRobshaw-OnPermutationOperationsInCipherDesign.pdf03-Feb-2009 20:31115.43K 
[DIR]IntroCrypto_fr.pdf03-Feb-2009 20:312.78MTutorials vx en francais
[DIR]IDEA_0304.pdf03-Feb-2009 20:31307.63K 
[DIR]IC_TECH_REPORT_199938.pdf03-Feb-2009 20:31182.95K 
[DIR]I2_cryptologie.pdf03-Feb-2009 20:3163.83Kanalysis algo stegano wordlists
[DIR]I22Diff.pdf03-Feb-2009 20:317.89K 
[DIR]HAVAL_paper.pdf03-Feb-2009 20:31268.11K 
[DIR]Grund_Symmetric-Cryptography_Paper.pdf03-Feb-2009 20:31366.84K 
[DIR]FeteSc.pdf03-Feb-2009 20:31160.38K 
[DIR]DPA.pdf03-Feb-2009 20:31217.32K 
[DIR]CypherpunkManifesto.txt03-Feb-2009 20:315.18K 
[DIR]Cryptography-3.pdf03-Feb-2009 20:3172.26K 
[DIR]Cryptography-1.pdf03-Feb-2009 20:3172.99K 
[DIR]Chap_07.pdf03-Feb-2009 20:31166.70K 
[DIR]CSE-97-15.pdf03-Feb-2009 20:31465.54K 
[DIR]CHJ_02ge.pdf03-Feb-2009 20:31275.08K 
[DIR]BRICS-RS-94-38.pdf03-Feb-2009 20:31292.86K 
[DIR]AGPS_01OCFB-paper.pdf03-Feb-2009 20:31279.04K 
[DIR]AFP-crypto-liberee.html03-Feb-2009 20:312.00Kanalysis algo stegano wordlists
[DIR]AES_Algorithm_Efficiency.html03-Feb-2009 20:3171.76KAES Algorithm Efficiency
[DIR]AB-9800.pdf03-Feb-2009 20:31232.70K 
[DIR]4.pdf03-Feb-2009 20:31465.58K 
[DIR]20thCenturyCryptoSpeech.txt03-Feb-2009 20:3125.11K 
[DIR]2004_sac_A4.pdf03-Feb-2009 20:31206.96K 
[DIR]2002_HDRThesis-US.pdf03-Feb-2009 20:311.66M 
[DIR]2001_goodman_jssc.pdf03-Feb-2009 20:31440.08K 
[DIR]1995meadows-asiacrypt94.pdf03-Feb-2009 20:31134.47K 
[DIR]199.pdf03-Feb-2009 20:3156.14K 
[DIR]148.pdf03-Feb-2009 20:31245.21K 
[DIR]147.pdf03-Feb-2009 20:31314.35K 
[DIR]144.pdf03-Feb-2009 20:3180.65K 
[DIR]126.pdf03-Feb-2009 20:31336.95K 
[DIR]0764541889.pdf03-Feb-2009 20:31241.14K 
[DIR]075.pdf03-Feb-2009 20:31126.91K 
[DIR]061.pdf03-Feb-2009 20:3170.33K 
[DIR]0501038.pdf03-Feb-2009 20:31105.31K 
[DIR]013-jgl.pdf03-Feb-2009 20:31272.30K 
[DIR]007.pdf03-Feb-2009 20:31142.67K 
[DIR]00-cnam-cryptographie.pdf03-Feb-2009 20:31199.47Kanalysis algo stegano wordlists

La marche des vertueux est semée d'obstacles qui sont les entreprises égoïstes que fait sans fin surgir l'oeuvre du malin. Béni soit il l'homme de bonne volonté qui au nom de la charité se fait le berger des faibles qu'il guide dans la vallée d'ombre de la mort et des larmes car il est le gardien de son frère et la providence des enfants égarés. J’abattrai alors le bras d'une terrible colère, d'une vengeance furieuse et effrayante sur les hordes impies qui pourchassent et réduisent à néant les brebis de dieu. Et tu connaîtras pourquoi mon nom est l'éternel quand sur toi s'abattra la vengeance du tout puissant. [Ezekiel 25, versé 10 (et Pulp Fiction)]
                                 --------------------------
                        /|  /|  |                          |
                        ||__||  |       Please don't       |
                       /   O O\__           feed           |
                      /          \       the trolls        |
                     /      \     \                        |
                    /   _    \     \ ----------------------
                   /    |\____\     \     ||
                  /     | | | |\____/     ||
                 /       \|_|_|/   |    __||
                /  /  \            |____| ||
               /   |   | /|        |      --|
               |   |   |//         |____  --|
        * _    |  |_|_|_|          |     \-/
     *-- _--\ _ \     //           |
       /  _     \ _ //   |        /
     *  /   \_ /- | -     |       |
       *      ___ c_c_c_C/ \C_c_c_c____________