Name Last modified Size Description
Parent Directory 14-May-2005 22:46 - Agonizing Memories
013.pdf 23-Jul-2004 13:04 57k Cryptanalysis of a Provably Secure Cryptographic Hash Function
015-samyde_french.pdf 30-Jun-2004 10:14 63k Cryptanalyse par side channel
016-samyde_english.pdf 23-Jul-2004 13:04 59k Side channel cryptanalysis
044.pdf 23-Jul-2004 13:04 312k Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
109.pdf 23-Jul-2004 13:05 240k Cryptanalysis of SAFER++
125.pdf 23-Jul-2004 13:05 229k Algebraic Attacks on Combiners with Memory and Several Outputs
135.pdf 23-Jul-2004 13:05 127k Collision Attack on Reduced Round Camellia
142.pdf 26-Jul-2004 12:11 153k On the Applicability of Distinguishing Attacks Against Stream Ciphers
152.pdf 25-Jul-2004 12:58 135k A note on Weak Keys of PES, IDEA and some Extended Variants
31-tkohno.pdf 23-Jul-2004 13:05 224k Preliminary Cryptanalysis of Reduced-Round Serpent
35-ebiham.pdf 08-Jul-2004 22:19 179k Cryptanalysis of Reduced Variants of Rijndael
36-tshimoyama.pdf 27-Jul-2004 11:01 196k Correlation Attack to the Block Cipher RC5 and the Simplified Variants of RC6
418pdf.pdf 05-Jul-2004 13:54 125k Trojan Horse Attacking Strategy on Quantum Cryptography
752.pdf 27-Jul-2004 11:02 662k Basic Cryptanalysis Techniques
AttackTranspositionICEST2003.pdf 27-Jul-2004 11:02 268k Attacks on the Transposition Ciphers Using Optimization Heuristics
BauerCryptanalysis.pdf 23-Jul-2004 13:05 96k Cryptanalysis
CS0910.revised.pdf 29-Aug-2004 12:11 197k Differential Fault Analysis of Secret Key Cryptosystems
CS0928.pdf 29-Aug-2004 12:11 177k Cryptanalysis of the ANSI X9.52 CDCM Mode
Crypto94.pdf 23-Jul-2004 13:06 230k Linear Cryptanalysis Using Multiple Approximations
DFT2002_Paper.pdf 27-Jul-2004 10:52 207k Fault-Based Side-Channel Cryptanalysis Tolerant Rijndael Symmetric Block Cipher Architecture
Dobbertin_MD4.pdf 08-Jul-2004 22:19 159k Cryptanalysis of MD4
Eurocrypt96.pdf 23-Jul-2004 13:06 249k Non-Linear Approximations in Linear Cryptanalysis
HG97chis.pdf 24-Jul-2004 08:49 127k Cryptanalysis of the SEAL Encryption Algorithm
Han99abs.pdf 30-Jun-2004 10:15 62k Cryptanalyse et sécurité des algorithmes à clé secrète
JournalHeysTavares.pdf 27-Jul-2004 11:02 176k Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis
NitNat.pdf 26-Jul-2004 12:49 335k Cracking the NitNat Cipher
RSA-survey.pdf 05-Jul-2004 13:55 303k Twenty Years of Attacks on RSA Cryptosystem
ShortSecretExponents.pdf 08-Jul-2004 22:20 119k Cryptanalysis of Short RSA Secret Exponents
SubstGen.pdf 27-Jul-2004 11:21 79k Solving Substitution Ciphers with Genetics Algorithm
TalkSummerschool.pdf 08-Jul-2004 22:20 161k Stream Cipher Cryptanalysis - Algebraic Attacks
TriStrata.pdf 27-Jul-2004 11:21 133k Security Weaknesses in a Randomized Stream Cipher
TwokeytripleDES.pdf 27-Jul-2004 11:21 58k Encryption and security: the Data Encryption Standard
WuHongjun_2002_23840169.pdf 27-Jul-2004 11:03 121k Cryptanalysis of Stream Cipher Alpha1
WuHongjun_2002_25130447.pdf 27-Jul-2004 11:03 92k Related-Cipher Attacks
Y_23_rc4_cryptana.pdf 27-Jul-2004 11:04 200k Cryptanalysis of RC4-like Ciphers
andreas3.pdf 27-Jul-2004 11:25 2.3M How secure is a cipher?
codebook_solution.pdf 05-Jul-2004 13:56 325k How we Cracked the Code Book Ciphers
correlation.pdf 29-Aug-2004 12:11 140k Searching for the Optimum Correlation Attack
cryptanalysis.pdf 08-Jul-2004 22:20 147k A Self-Study Course in Block-Cipher Cryptanalysis
cs753.pdf 15-Sep-2004 19:41 227k New Types of Cryptanalytic Attacks Using Related Keys
cs782.pdf 15-Sep-2004 19:42 213k Differential Cryptanalysis of Lucifer
cs813.pdf 15-Sep-2004 19:42 188k On Matsui's Linear Cryptanalysis
cs817.pdf 15-Sep-2004 19:43 166k An Improvement of Davies' Attack on DES
cs833.pdf 15-Sep-2004 19:43 186k Cryptanalysis of Multiple Modes of Operation
cs842.pdf 15-Sep-2004 19:44 173k A Known Plaintext Attack on the PKZIP Stream Cipher
cs885.pdf 15-Sep-2004 19:45 261k Cryptanalysis of Triple Modes of Operation
drm1.pdf 25-Jul-2004 13:47 162k Attacking an obfuscated cipher by injecting faults
extwp3-001-2.pdf 27-Jul-2004 11:07 81k Cryptanalysis of LILI-128
fmirza-report.pdf 24-Jul-2004 08:43 241k Block Ciphers And Cryptanalysis
frogAES2pub.pdf 24-Jul-2004 13:20 195k Cryptanalysis of FROG
fse98.pdf 29-Aug-2004 12:11 190k Differential Cryptanalysis of the ICE Encrypting Algorithm
heurlang.pdf 27-Jul-2004 11:25 34k Heuristic Language Analysis: Techniques and Applications
icrijndael.pdf 27-Jul-2004 11:07 204k Improved Cryptanalysis of Rijndael
idea.pdf 29-Aug-2004 12:11 191k The Block Cipher IDEA
initial_securid_analysis.pdf 24-Jul-2004 08:54 129k Initial Cryptanalysis of the RSA SecurID Algorithm
keliherPhD.pdf 27-Jul-2004 11:08 714k Linear Cryptanalysis of Substitution-Permutation Networks
keysched-crypto96.pdf 29-Aug-2004 12:12 220k Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
keysched-icics97.pdf 29-Aug-2004 12:12 218k Related-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA
loki97.pdf 29-Aug-2004 12:12 87k Weaknesses in LOKI97
md5-cryptanalysis.txt 24-Jul-2004 11:35 6k Analysis and Design of Cryptographic Hash Functions
mmthesis-side-channel.pdf 27-Jul-2004 11:09 816k Techniques of Side Channel Cryptanalysis
muxfsr.pdf 29-Aug-2004 12:12 134k A Faster Attack on Certain Stream Ciphers
natarara.pdf 24-Jul-2004 08:43 151k Differential CryptAnalysis
paper-design-vulnerabilities.pdf 25-Jul-2004 13:59 108k Cryptographic Design Vulnerabilities
provsec.pdf 29-Aug-2004 12:42 145k Weak Keys
pseudorandom_number.pdf 25-Jul-2004 14:03 219k Cryptanalytic Attacks on Pseudorandom Number Generators
rc5.pdf 29-Aug-2004 12:12 202k Improved Differential Attacks on RC5
rc5diff.pdf 29-Aug-2004 12:42 153k
repetition_codes.pdf 27-Jul-2004 11:27 68k Breaking Block Ciphers using Repetition Codes
rsa.txt 24-Jul-2004 11:35 6k RSA: Attacking the cryptosystem
sshtiming.pdf 25-Jul-2004 14:20 317k Timing Analysis of Keystrokes and Timing Attacks on SSH
ssl-timing.pdf 05-Jul-2004 13:56 144k Remote Timing Attacks are Practical
trunc_dif_saf.pdf 29-Aug-2004 12:13 184k Truncated Differentials of SAFER
|
Si tu peux résoudre un problème, quel besoin as tu de t'inquiéter ? Si tu ne peux le résoudre, à quoi bon te faire du souci? [Dalai Lama]
|
,------------------------------------------------------------------
| madchat.org # updates # buildtime: 20061031 # donjon files: -===~
|
,------------ /coding/
| The Tao of Programming
|
,------------ /coding/ai/games/
| Game AI: The shrinking gap between computer games and AI systems
| Making the Human Care: On Building Engaging Bots
|
,------------ /coding/ai/games/quake/
| Quake II as a Robotic and Multi-Agent Platform
| It Knows What You’re Going To Do: Adding Anticipation to a Quakebot
| Intelligent Autonomous Agents in Quake
| Quake III : Fun And More - A tutorial introduction to building Quake III mods and more!
| The Quake III Arena Bot
|
,------------ /esprit/emags/dhmag/
| DOS Help Magazine/Volume 1,Number 01: Shape up your DOS environment, Mixed Language Programming
| DOS Help Magazine/Volume 1,Number 02: The PSP, ANSI, opening the CD Tray
| DOS Help Magazine/Volume 1,Number 03: Hex2Dec2Bin2Oct, TSR Clock, More File Handles, ERRORLEVEL
| DOS Help Magazine/Volume 1,Number 04: Keyboard LED's, Undocumented FORMAT, Reboot, ANSI
| DOS Help Magazine/Volume 1,Number 05: Unloading TSR's, Tips and Tricks, Video Hardware
| DOS Help Magazine/Volume 1,Number 06: Animation, MASM for Free, Self Replicating Source
|
,------------ /esprit/emags/tcdiaries/
| tcdiaries1.zip
| tcdiaries2.zip
| tcdiaries3.zip
| tcpaper1.zip
| tcpaper2.zip
| tcpaper3.zip
|
,------------ /vxdevl/vxsrc/
| Acad.Galaxy
|
| Win9x.FirstBorn
|
| Win95.Etymo-Crypt
|
| I-Worm.PieceByPiece
| I-Worm.Alizee
|
| Win32.Parrot
| Win32.Cichosz
| Win32.Ramlide
| Win32.Enumero
| Win32.Nastena
| Win32.Nicole
|
`------------------------------------------------------------------
the Spice expands consciousness / Smuggled by the evil Dr.Gang
._____.___ .______ .______ ._______ .___.__ .______ _____._
: |: \ :_ _ \ :_. ___\: | \ : \ \__ _:|
| \ / || . || | || : |/\ | : || . | | :|
| |\/ || : || . | || / \| . || : | | |
|___| | ||___| ||. ____/ |. _____/|___| ||___| | | |
|___| |___| :/ :/ |___| |___| |___|
: :->