Name                             Last modified       Size  Description

[FOLDER] Parent Directory 14-May-2005 22:46 - Agonizing Memories [txt] 013.pdf 23-Jul-2004 13:04 57k Cryptanalysis of a Provably Secure Cryptographic Hash Function [txt] 015-samyde_french.pdf 30-Jun-2004 10:14 63k Cryptanalyse par side channel [txt] 016-samyde_english.pdf 23-Jul-2004 13:04 59k Side channel cryptanalysis [txt] 044.pdf 23-Jul-2004 13:04 312k Cryptanalysis of Block Ciphers with Overdefined Systems of Equations [txt] 109.pdf 23-Jul-2004 13:05 240k Cryptanalysis of SAFER++ [txt] 125.pdf 23-Jul-2004 13:05 229k Algebraic Attacks on Combiners with Memory and Several Outputs [txt] 135.pdf 23-Jul-2004 13:05 127k Collision Attack on Reduced Round Camellia [txt] 142.pdf 26-Jul-2004 12:11 153k On the Applicability of Distinguishing Attacks Against Stream Ciphers [txt] 152.pdf 25-Jul-2004 12:58 135k A note on Weak Keys of PES, IDEA and some Extended Variants [txt] 31-tkohno.pdf 23-Jul-2004 13:05 224k Preliminary Cryptanalysis of Reduced-Round Serpent [txt] 35-ebiham.pdf 08-Jul-2004 22:19 179k Cryptanalysis of Reduced Variants of Rijndael [txt] 36-tshimoyama.pdf 27-Jul-2004 11:01 196k Correlation Attack to the Block Cipher RC5 and the Simplified Variants of RC6 [txt] 418pdf.pdf 05-Jul-2004 13:54 125k Trojan Horse Attacking Strategy on Quantum Cryptography [txt] 752.pdf 27-Jul-2004 11:02 662k Basic Cryptanalysis Techniques [txt] AttackTranspositionICEST2003.pdf 27-Jul-2004 11:02 268k Attacks on the Transposition Ciphers Using Optimization Heuristics [txt] BauerCryptanalysis.pdf 23-Jul-2004 13:05 96k Cryptanalysis [txt] CS0910.revised.pdf 29-Aug-2004 12:11 197k Differential Fault Analysis of Secret Key Cryptosystems [txt] CS0928.pdf 29-Aug-2004 12:11 177k Cryptanalysis of the ANSI X9.52 CDCM Mode [txt] Crypto94.pdf 23-Jul-2004 13:06 230k Linear Cryptanalysis Using Multiple Approximations [txt] DFT2002_Paper.pdf 27-Jul-2004 10:52 207k Fault-Based Side-Channel Cryptanalysis Tolerant Rijndael Symmetric Block Cipher Architecture [txt] Dobbertin_MD4.pdf 08-Jul-2004 22:19 159k Cryptanalysis of MD4 [txt] Eurocrypt96.pdf 23-Jul-2004 13:06 249k Non-Linear Approximations in Linear Cryptanalysis [txt] HG97chis.pdf 24-Jul-2004 08:49 127k Cryptanalysis of the SEAL Encryption Algorithm [txt] Han99abs.pdf 30-Jun-2004 10:15 62k Cryptanalyse et sécurité des algorithmes à clé secrète [txt] JournalHeysTavares.pdf 27-Jul-2004 11:02 176k Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis [txt] NitNat.pdf 26-Jul-2004 12:49 335k Cracking the NitNat Cipher [txt] RSA-survey.pdf 05-Jul-2004 13:55 303k Twenty Years of Attacks on RSA Cryptosystem [txt] ShortSecretExponents.pdf 08-Jul-2004 22:20 119k Cryptanalysis of Short RSA Secret Exponents [txt] SubstGen.pdf 27-Jul-2004 11:21 79k Solving Substitution Ciphers with Genetics Algorithm [txt] TalkSummerschool.pdf 08-Jul-2004 22:20 161k Stream Cipher Cryptanalysis - Algebraic Attacks [txt] TriStrata.pdf 27-Jul-2004 11:21 133k Security Weaknesses in a Randomized Stream Cipher [txt] TwokeytripleDES.pdf 27-Jul-2004 11:21 58k Encryption and security: the Data Encryption Standard [txt] WuHongjun_2002_23840169.pdf 27-Jul-2004 11:03 121k Cryptanalysis of Stream Cipher Alpha1 [txt] WuHongjun_2002_25130447.pdf 27-Jul-2004 11:03 92k Related-Cipher Attacks [txt] Y_23_rc4_cryptana.pdf 27-Jul-2004 11:04 200k Cryptanalysis of RC4-like Ciphers [txt] andreas3.pdf 27-Jul-2004 11:25 2.3M How secure is a cipher? [txt] codebook_solution.pdf 05-Jul-2004 13:56 325k How we Cracked the Code Book Ciphers [txt] correlation.pdf 29-Aug-2004 12:11 140k Searching for the Optimum Correlation Attack [txt] cryptanalysis.pdf 08-Jul-2004 22:20 147k A Self-Study Course in Block-Cipher Cryptanalysis [txt] cs753.pdf 15-Sep-2004 19:41 227k New Types of Cryptanalytic Attacks Using Related Keys [txt] cs782.pdf 15-Sep-2004 19:42 213k Differential Cryptanalysis of Lucifer [txt] cs813.pdf 15-Sep-2004 19:42 188k On Matsui's Linear Cryptanalysis [txt] cs817.pdf 15-Sep-2004 19:43 166k An Improvement of Davies' Attack on DES [txt] cs833.pdf 15-Sep-2004 19:43 186k Cryptanalysis of Multiple Modes of Operation [txt] cs842.pdf 15-Sep-2004 19:44 173k A Known Plaintext Attack on the PKZIP Stream Cipher [txt] cs885.pdf 15-Sep-2004 19:45 261k Cryptanalysis of Triple Modes of Operation [txt] drm1.pdf 25-Jul-2004 13:47 162k Attacking an obfuscated cipher by injecting faults [txt] extwp3-001-2.pdf 27-Jul-2004 11:07 81k Cryptanalysis of LILI-128 [txt] fmirza-report.pdf 24-Jul-2004 08:43 241k Block Ciphers And Cryptanalysis [txt] frogAES2pub.pdf 24-Jul-2004 13:20 195k Cryptanalysis of FROG [txt] fse98.pdf 29-Aug-2004 12:11 190k Differential Cryptanalysis of the ICE Encrypting Algorithm [txt] heurlang.pdf 27-Jul-2004 11:25 34k Heuristic Language Analysis: Techniques and Applications [txt] icrijndael.pdf 27-Jul-2004 11:07 204k Improved Cryptanalysis of Rijndael [txt] idea.pdf 29-Aug-2004 12:11 191k The Block Cipher IDEA [txt] initial_securid_analysis.pdf 24-Jul-2004 08:54 129k Initial Cryptanalysis of the RSA SecurID Algorithm [txt] keliherPhD.pdf 27-Jul-2004 11:08 714k Linear Cryptanalysis of Substitution-Permutation Networks [txt] keysched-crypto96.pdf 29-Aug-2004 12:12 220k Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES [txt] keysched-icics97.pdf 29-Aug-2004 12:12 218k Related-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA [txt] loki97.pdf 29-Aug-2004 12:12 87k Weaknesses in LOKI97 [TXT] md5-cryptanalysis.txt 24-Jul-2004 11:35 6k Analysis and Design of Cryptographic Hash Functions [txt] mmthesis-side-channel.pdf 27-Jul-2004 11:09 816k Techniques of Side Channel Cryptanalysis [txt] muxfsr.pdf 29-Aug-2004 12:12 134k A Faster Attack on Certain Stream Ciphers [txt] natarara.pdf 24-Jul-2004 08:43 151k Differential CryptAnalysis [txt] paper-design-vulnerabilities.pdf 25-Jul-2004 13:59 108k Cryptographic Design Vulnerabilities [txt] provsec.pdf 29-Aug-2004 12:42 145k Weak Keys [txt] pseudorandom_number.pdf 25-Jul-2004 14:03 219k Cryptanalytic Attacks on Pseudorandom Number Generators [txt] rc5.pdf 29-Aug-2004 12:12 202k Improved Differential Attacks on RC5 [txt] rc5diff.pdf 29-Aug-2004 12:42 153k [txt] repetition_codes.pdf 27-Jul-2004 11:27 68k Breaking Block Ciphers using Repetition Codes [TXT] rsa.txt 24-Jul-2004 11:35 6k RSA: Attacking the cryptosystem [txt] sshtiming.pdf 25-Jul-2004 14:20 317k Timing Analysis of Keystrokes and Timing Attacks on SSH [txt] ssl-timing.pdf 05-Jul-2004 13:56 144k Remote Timing Attacks are Practical [txt] trunc_dif_saf.pdf 29-Aug-2004 12:13 184k Truncated Differentials of SAFER

Si tu peux résoudre un problème, quel besoin as tu de t'inquiéter ? Si tu ne peux le résoudre, à quoi bon te faire du souci? [Dalai Lama]
 
,------------------------------------------------------------------
| madchat.org # updates # buildtime: 20061031 # donjon files: -===~
| 
,------------ /coding/
| The Tao of Programming
|
,------------ /coding/ai/games/
| Game AI: The shrinking gap between computer games and AI systems
| Making the Human Care: On Building Engaging Bots
|
,------------ /coding/ai/games/quake/
| Quake II as a Robotic and Multi-Agent Platform
| It Knows What You’re Going To Do: Adding Anticipation to a Quakebot
| Intelligent Autonomous Agents in Quake
| Quake III : Fun And More - A tutorial introduction to building Quake III mods and more!
| The Quake III Arena Bot
|
,------------ /esprit/emags/dhmag/
| DOS Help Magazine/Volume 1,Number 01: Shape up your DOS environment, Mixed Language Programming
| DOS Help Magazine/Volume 1,Number 02: The PSP, ANSI, opening the CD Tray
| DOS Help Magazine/Volume 1,Number 03: Hex2Dec2Bin2Oct, TSR Clock, More File Handles, ERRORLEVEL
| DOS Help Magazine/Volume 1,Number 04: Keyboard LED's, Undocumented FORMAT, Reboot, ANSI
| DOS Help Magazine/Volume 1,Number 05: Unloading TSR's, Tips and Tricks, Video Hardware
| DOS Help Magazine/Volume 1,Number 06: Animation, MASM for Free, Self Replicating Source
|
,------------ /esprit/emags/tcdiaries/
| tcdiaries1.zip
| tcdiaries2.zip
| tcdiaries3.zip
| tcpaper1.zip
| tcpaper2.zip
| tcpaper3.zip
|
,------------ /vxdevl/vxsrc/
| Acad.Galaxy        
|
| Win9x.FirstBorn
|
| Win95.Etymo-Crypt
|
| I-Worm.PieceByPiece
| I-Worm.Alizee  
|
| Win32.Parrot
| Win32.Cichosz       
| Win32.Ramlide
| Win32.Enumero 
| Win32.Nastena       
| Win32.Nicole        
|
`------------------------------------------------------------------

 
the Spice expands consciousness / Smuggled by the evil Dr.Gang
      ._____.___ .______  .______  ._______ .___.__  .______  _____._
      :         |:      \ :_ _   \ :_.  ___\:   |  \ :      \ \__ _:|
      |   \  /  ||   .   ||   |   ||  : |/\ |   :   ||   .   |  |  :|
      |   |\/   ||   :   || . |   ||    /  \|   .   ||   :   |  |   |
      |___| |   ||___|   ||. ____/ |. _____/|___|   ||___|   |  |   |
            |___|    |___| :/       :/          |___|    |___|  |___|
                           :        :->