Un jour j'ai arrete de bosser... et ma tete s'est remise a marcher. --Anita Bomba |
Name | Last modified | Size | Description | |
Parent Directory | - | Agonizing Memories | ||
archives | 18-Jul-2010 00:15 | - | ||
AFP-crypto-liberee.html | 03-Feb-2009 20:31 | 2.00K | analysis algo stegano wordlists | |
md5-vs-sha.txt | 03-Feb-2009 20:31 | 4.83K | ||
CypherpunkManifesto.txt | 03-Feb-2009 20:31 | 5.18K | ||
I22Diff.pdf | 03-Feb-2009 20:31 | 7.89K | ||
RabinCryptosystem.txt | 03-Feb-2009 20:31 | 8.21K | ||
herys.pdf | 03-Feb-2009 20:31 | 10.37K | ||
chaffing-and-winnowing.txt | 03-Feb-2009 20:31 | 25.08K | ||
20thCenturyCryptoSpeech.txt | 03-Feb-2009 20:31 | 25.11K | ||
text.pdf | 03-Feb-2009 20:31 | 25.51K | ||
bsa-final-report.txt | 03-Feb-2009 20:31 | 28.89K | ||
Wits00.pdf | 03-Feb-2009 20:31 | 29.15K | ||
paper723.pdf | 03-Feb-2009 20:31 | 30.21K | ||
essay-037.pdf | 03-Feb-2009 20:31 | 31.24K | ||
paper732.pdf | 03-Feb-2009 20:31 | 32.96K | ||
paper751.pdf | 03-Feb-2009 20:31 | 33.15K | ||
paper735.pdf | 03-Feb-2009 20:31 | 33.17K | ||
paper722.pdf | 03-Feb-2009 20:31 | 33.70K | ||
examples.pdf | 03-Feb-2009 20:31 | 37.11K | ||
paper736.pdf | 03-Feb-2009 20:31 | 38.50K | ||
paper740.pdf | 03-Feb-2009 20:31 | 40.01K | Executable source code and non-executable source code: analysis and relationships | |
trapdoor.pdf | 03-Feb-2009 20:31 | 40.57K | ||
Simplecrypto.pdf | 03-Feb-2009 20:31 | 41.63K | ||
cfskey.pdf | 03-Feb-2009 20:31 | 41.71K | ||
gladman.pdf | 03-Feb-2009 20:31 | 45.12K | ||
high-perf-crypto.pdf | 03-Feb-2009 20:31 | 45.66K | analysis algo stegano wordlists | |
paper726.pdf | 03-Feb-2009 20:31 | 46.50K | ||
onetime.pdf | 03-Feb-2009 20:31 | 50.11K | ||
md5_someday.pdf | 03-Feb-2009 20:31 | 54.59K | ||
pitfalls.pdf | 03-Feb-2009 20:31 | 55.66K | ||
199.pdf | 03-Feb-2009 20:31 | 56.14K | ||
key-mngmt-crypto-fs.pdf | 03-Feb-2009 20:31 | 56.92K | analysis algo stegano wordlists | |
elec6703-2-3.pdf | 03-Feb-2009 20:31 | 59.52K | ||
paper768.pdf | 03-Feb-2009 20:31 | 59.96K | ||
esm.pdf | 03-Feb-2009 20:31 | 60.46K | ||
qbsc_2004.pdf | 03-Feb-2009 20:31 | 62.26K | ||
internet-modes.pdf | 03-Feb-2009 20:31 | 62.27K | ||
shi_asap00.pdf | 03-Feb-2009 20:31 | 62.80K | ||
I2_cryptologie.pdf | 03-Feb-2009 20:31 | 63.83K | analysis algo stegano wordlists | |
cryptoanalyse.pdf | 03-Feb-2009 20:31 | 64.20K | analysis algo stegano wordlists | |
bit_order.pdf | 03-Feb-2009 20:31 | 65.72K | ||
paper764.pdf | 03-Feb-2009 20:31 | 69.73K | ||
061.pdf | 03-Feb-2009 20:31 | 70.33K | ||
paper886.pdf | 03-Feb-2009 20:31 | 71.63K | ||
AES_Algorithm_Efficiency.html | 03-Feb-2009 20:31 | 71.76K | AES Algorithm Efficiency | |
Cryptography-3.pdf | 03-Feb-2009 20:31 | 72.26K | ||
paper874.pdf | 03-Feb-2009 20:31 | 72.51K | ||
Cryptography-1.pdf | 03-Feb-2009 20:31 | 72.99K | ||
paper716.pdf | 03-Feb-2009 20:31 | 75.57K | ||
fse93.pdf | 03-Feb-2009 20:31 | 76.90K | ||
SubstGen.pdf | 03-Feb-2009 20:31 | 79.18K | ||
144.pdf | 03-Feb-2009 20:31 | 80.65K | ||
cfs.pdf | 03-Feb-2009 20:31 | 82.48K | ||
paper724.pdf | 03-Feb-2009 20:31 | 85.47K | ||
Nac95abs.pdf | 03-Feb-2009 20:31 | 86.89K | ||
dean02.pdf | 03-Feb-2009 20:31 | 93.97K | ||
RivestKaliski-RSAProblem.pdf | 03-Feb-2009 20:31 | 97.18K | ||
katmct.pdf | 03-Feb-2009 20:31 | 98.45K | ||
c.pdf | 03-Feb-2009 20:31 | 98.65K | ||
crypt.talk.pdf | 03-Feb-2009 20:31 | 100.00K | ||
paper737.pdf | 03-Feb-2009 20:31 | 100.62K | ||
The_simple_ideal_cipher_system.pdf | 03-Feb-2009 20:31 | 103.63K | ||
NMWd95ca.pdf | 03-Feb-2009 20:31 | 104.86K | ||
0501038.pdf | 03-Feb-2009 20:31 | 105.31K | ||
LeeShiYinRivestRobshaw-OnPermutationOperationsInCipherDesign.pdf | 03-Feb-2009 20:31 | 115.43K | ||
modesv2.pdf | 03-Feb-2009 20:31 | 117.81K | ||
cbtwirl.pdf | 03-Feb-2009 20:31 | 118.33K | ||
odyssey.pdf | 03-Feb-2009 20:31 | 120.38K | ||
matrices.pdf | 03-Feb-2009 20:31 | 120.90K | ||
fawkes.pdf | 03-Feb-2009 20:31 | 122.05K | ||
robustness.pdf | 03-Feb-2009 20:31 | 123.39K | ||
075.pdf | 03-Feb-2009 20:31 | 126.91K | ||
cucs-021-04.pdf | 03-Feb-2009 20:31 | 130.88K | ||
ocf.pdf | 03-Feb-2009 20:31 | 133.32K | ||
1995meadows-asiacrypt94.pdf | 03-Feb-2009 20:31 | 134.47K | ||
paper738.pdf | 03-Feb-2009 20:31 | 134.52K | ||
007.pdf | 03-Feb-2009 20:31 | 142.67K | ||
fusion.pdf | 03-Feb-2009 20:31 | 147.55K | ||
SurveyAsynchExt.pdf | 03-Feb-2009 20:31 | 148.82K | ||
wake.pdf | 03-Feb-2009 20:31 | 150.26K | ||
bear-lion.pdf | 03-Feb-2009 20:31 | 152.08K | ||
PB-472.pdf | 03-Feb-2009 20:31 | 157.12K | ||
djalil-crypto.pdf | 03-Feb-2009 20:31 | 157.32K | analysis algo stegano wordlists | |
FeteSc.pdf | 03-Feb-2009 20:31 | 160.38K | ||
Chap_07.pdf | 03-Feb-2009 20:31 | 166.70K | ||
keyrecovery.pdf | 03-Feb-2009 20:31 | 169.32K | ||
crypto_mod.pdf | 03-Feb-2009 20:31 | 173.38K | analysis algo stegano wordlists | |
perf.pdf | 03-Feb-2009 20:31 | 178.96K | ||
ches99.pdf | 03-Feb-2009 20:31 | 181.34K | ||
IC_TECH_REPORT_199938.pdf | 03-Feb-2009 20:31 | 182.95K | ||
code.pdf | 03-Feb-2009 20:31 | 197.88K | [VM] Explication du code de VM du Linux 2.4 | |
00-cnam-cryptographie.pdf | 03-Feb-2009 20:31 | 199.47K | analysis algo stegano wordlists | |
queensland.pdf | 03-Feb-2009 20:31 | 202.09K | ||
arit.pdf | 03-Feb-2009 20:31 | 202.17K | ||
crypto_moderne.pdf | 03-Feb-2009 20:31 | 204.73K | analysis algo stegano wordlists | |
2004_sac_A4.pdf | 03-Feb-2009 20:31 | 206.96K | ||
skipjack-kea.pdf | 03-Feb-2009 20:31 | 213.77K | ||
histoire_cryptographie.pdf | 03-Feb-2009 20:31 | 215.41K | analysis algo stegano wordlists | |
ipsec.pdf | 03-Feb-2009 20:31 | 216.47K | ||
crypto.pdf | 03-Feb-2009 20:31 | 216.83K | analysis algo stegano wordlists | |
DPA.pdf | 03-Feb-2009 20:31 | 217.32K | ||
cryptography_new.pdf | 03-Feb-2009 20:31 | 219.37K | analysis algo stegano wordlists | |
alibaba.pdf | 03-Feb-2009 20:31 | 226.79K | ||
cocaine-auction-protocol.pdf | 03-Feb-2009 20:31 | 226.82K | ||
AB-9800.pdf | 03-Feb-2009 20:31 | 232.70K | ||
marco.pdf | 03-Feb-2009 20:31 | 232.75K | ||
inc2.pdf | 03-Feb-2009 20:31 | 236.62K | ||
NT.pdf | 03-Feb-2009 20:31 | 240.45K | ||
0764541889.pdf | 03-Feb-2009 20:31 | 241.14K | ||
lpe.pdf | 03-Feb-2009 20:31 | 242.45K | ||
paper879.pdf | 03-Feb-2009 20:31 | 244.73K | ||
148.pdf | 03-Feb-2009 20:31 | 245.21K | ||
inc1.pdf | 03-Feb-2009 20:31 | 258.61K | ||
oakland.pdf | 03-Feb-2009 20:31 | 263.42K | ||
understanding_ssl.pdf | 03-Feb-2009 20:31 | 265.44K | ||
HAVAL_paper.pdf | 03-Feb-2009 20:31 | 268.11K | ||
TuringPres.pdf | 03-Feb-2009 20:31 | 270.34K | ||
paper878.pdf | 03-Feb-2009 20:31 | 270.75K | ||
013-jgl.pdf | 03-Feb-2009 20:31 | 272.30K | ||
CHJ_02ge.pdf | 03-Feb-2009 20:31 | 275.08K | ||
new_introduction_crypto.pdf | 03-Feb-2009 20:31 | 278.17K | analysis algo stegano wordlists | |
AGPS_01OCFB-paper.pdf | 03-Feb-2009 20:31 | 279.04K | ||
RSA_hardware_implementation.pdf | 03-Feb-2009 20:31 | 279.13K | ||
BRICS-RS-94-38.pdf | 03-Feb-2009 20:31 | 292.86K | ||
usenix00.pdf | 03-Feb-2009 20:31 | 293.43K | ||
lars_knudsen.pdf | 03-Feb-2009 20:31 | 301.41K | ||
aes-crypto.pdf | 03-Feb-2009 20:31 | 303.87K | analysis algo stegano wordlists | |
IDEA_0304.pdf | 03-Feb-2009 20:31 | 307.63K | ||
147.pdf | 03-Feb-2009 20:31 | 314.35K | ||
preprint_frey.pdf | 03-Feb-2009 20:31 | 336.19K | Tutorials vx en francais | |
126.pdf | 03-Feb-2009 20:31 | 336.95K | ||
Grund_Symmetric-Cryptography_Paper.pdf | 03-Feb-2009 20:31 | 366.84K | ||
UserAuth.pdf | 03-Feb-2009 20:31 | 390.47K | ||
paper885.pdf | 03-Feb-2009 20:31 | 394.69K | ||
LinuxChiffrement.pdf | 03-Feb-2009 20:31 | 398.72K | ||
fox_ujf.pdf | 03-Feb-2009 20:31 | 401.57K | ||
inchash.pdf | 03-Feb-2009 20:31 | 427.08K | ||
cryptosizes.pdf | 03-Feb-2009 20:31 | 438.23K | analysis algo stegano wordlists | |
2001_goodman_jssc.pdf | 03-Feb-2009 20:31 | 440.08K | ||
CSE-97-15.pdf | 03-Feb-2009 20:31 | 465.54K | ||
4.pdf | 03-Feb-2009 20:31 | 465.58K | ||
concours_aes.pdf | 03-Feb-2009 20:31 | 470.52K | Analyse des algorithmes finalistes concourant pour le futur standard AES | |
SaveVig.pdf | 03-Feb-2009 20:31 | 476.28K | ||
RHUL-MA-2001-5.pdf | 03-Feb-2009 20:31 | 500.60K | ||
Part_III.pdf | 03-Feb-2009 20:31 | 520.34K | ||
ocb-full.pdf | 03-Feb-2009 20:31 | 659.44K | ||
thesis-ac.pdf | 03-Feb-2009 20:31 | 667.61K | ||
musee.pdf | 03-Feb-2009 20:31 | 717.82K | ||
memoire-julien.pdf | 03-Feb-2009 20:31 | 720.29K | ||
cmc.pdf | 03-Feb-2009 20:31 | 750.05K | ||
RSA02.pdf | 03-Feb-2009 20:31 | 854.55K | ||
NewsKeyRecoverySVV10.pdf | 03-Mar-2011 13:10 | 931.64K | ||
secret_key_cryptography.pdf | 03-Feb-2009 20:31 | 1.12M | analysis algo stegano wordlists | |
thesis.pdf | 03-Feb-2009 20:31 | 1.63M | ||
2002_HDRThesis-US.pdf | 03-Feb-2009 20:31 | 1.66M | ||
QC.pdf | 03-Feb-2009 20:31 | 1.80M | ||
andreas3.pdf | 03-Feb-2009 20:31 | 2.30M | ||
IntroCrypto_fr.pdf | 03-Feb-2009 20:31 | 2.78M | Tutorials vx en francais | |
La non-violence sous sa forme active, consiste en une bienveillance envers tout ce qui existe. [Gandhi] |
-------------------------- /| /| | | ||__|| | Please don't | / O O\__ feed | / \ the trolls | / \ \ | / _ \ \ ---------------------- / |\____\ \ || / | | | |\____/ || / \|_|_|/ | __|| / / \ |____| || / | | /| | --| | | |// |____ --| * _ | |_|_|_| | \-/ *-- _--\ _ \ // | / _ \ _ // | / * / \_ /- | - | | * ___ c_c_c_C/ \C_c_c_c____________ |