Name Last modified Size Description
Parent Directory 14-May-2005 22:46 - Agonizing Memories 00-cnam-cryptographie.pdf 30-Jun-2004 10:14 199k Les Techniques De Cryptographie 007.pdf 26-Feb-2005 18:34 143k The Misuse of RC4 in Microsoft Word and Excel 013-jgl.pdf 24-Jul-2004 13:18 272k Vérification de protocoles cryptographiques 0501038.pdf 26-Feb-2005 18:34 105k Data Tastes Better Seasoned: Introducing the ASH Family of Hashing Algorithms 061.pdf 24-Jul-2004 13:18 70k Strengthened Encryption in the CBC Mode 075.pdf 26-Jul-2004 12:10 127k An Hybrid Mode of Operation 0764541889.pdf 05-Jul-2004 13:54 241k A Primer on Crypto Basics 126.pdf 24-Jul-2004 08:45 337k Certificateless Public Key Cryptography 144.pdf 24-Jul-2004 08:45 81k ID-based tripartite key agreement with signatures 147.pdf 24-Jul-2004 08:45 314k A Parallelizable Enciphering Mode 148.pdf 24-Jul-2004 08:46 245k The EMD Mode of Operation (A Tweaked, Wide-Blocksize, Strong PRP) 199.pdf 26-Feb-2005 18:34 56k Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD 1995meadows-asiacrypt94.pdf 07-Jul-2004 23:14 134k Formal Verification of Cryptographic Protocols: A Survey 2001_goodman_jssc.pdf 25-Jul-2004 13:04 440k An Energy-Efficient Reconfigurable Public-Key Cryptography Processor 2002_HDRThesis-US.pdf 24-Jul-2004 08:48 1.7M Le Chiffrement Asymetrique et la Securite Prouvee 2004_sac_A4.pdf 26-Jul-2004 12:14 207k Design and Implementation of a Crypto Processor and Its Application to Security System 20thCenturyCryptoSpeech.txt 24-Jul-2004 11:35 25k The Five Great Inventions of Twentieth Century Cryptography 4.pdf 24-Jul-2004 13:19 466k Design and Implementation of a Crypto Processor and Its Application to Security System AB-9800.pdf 25-Jul-2004 13:06 233k Recent Developments in the Design of Conventional Cryptographic Algorithms AES Algorithm Efficiency.html 11-Nov-2004 20:01 72k AES Algorithm Efficiency AFP-crypto-liberee.html 17-Jan-2003 07:00 2k L'usage de la cryptologie va en outre devenir totalement libre AGPS_01OCFB-paper.pdf 26-Jul-2004 12:18 279k Optimized Self-Synchronizing Mode of Operation BRICS-RS-94-38.pdf 27-Jul-2004 10:52 293k Enhancing the Strength of Conventional Cryptosystems CHJ_02ge.pdf 26-Jul-2004 12:26 275k GEM: a Generic Chosen-Ciphertext Secure Encryption Method CSE-97-15.pdf 26-Jul-2004 12:32 466k The Security of the Cipher Block Chaining Message Authentication Code Chap_07.pdf 24-Jul-2004 08:48 167k Cryptologie Cryptography-1.pdf 25-Jul-2004 13:08 73k Cryptography: Public Key Cryptography; Mathematical Preliminaries Cryptography-3.pdf 26-Jul-2004 12:34 72k Cryptography: RSA Encryption and Decryption CypherpunkManifesto.txt 28-Aug-2004 18:31 5k A Cypherpunk's Manifesto by Eric Hughes DPA.pdf 25-Jul-2004 13:10 217k Differential Power Analysis FeteSc.pdf 24-Jul-2004 13:19 160k Arithmétique et cryptologie Grund_Symmetric-Cryptography_Paper.pdf 24-Jul-2004 08:48 367k Symmetric Cryptography HAVAL_paper.pdf 29-Aug-2004 12:40 268k HAVAL - A One-Way Hashing Algorithm with Variable Length of Output I22Diff.pdf 25-Jul-2004 13:10 8k The Export of Cryptography in the 20th Century and the 21st I2_cryptologie.pdf 30-Jun-2004 10:15 64k Introduction à la cryptologie et aux cryptosystèmes IC_TECH_REPORT_199938.pdf 25-Jul-2004 13:12 183k Formal methods in the design of cryptographic protocols IDEA_0304.pdf 25-Jul-2004 13:14 308k Design and Implementation of a Crypto Processor and Its Application to Security System IntroCrypto_fr.pdf 30-Jun-2004 10:23 2.8M Introduction à la cryptographie LeeShiYinRivestRobshaw-OnPermutationOperationsInCipherDesign.pdf 26-Jul-2004 12:41 115k On Permutation Operations in Cipher Design LinuxChiffrement.pdf 30-Jun-2004 10:25 399k Chiffrement de données sous GNU/Linux NMWd95ca.pdf 05-Jul-2004 13:54 105k Are Crypto-Accelerators Really Inevitable? NT.pdf 25-Jul-2004 13:16 240k Number Theory and Cryptography Nac95abs.pdf 07-Jul-2004 23:14 87k Signatures numeriques et preuves a divulgation nulle, cryptanalyse, defense et outils algorithmiques PB-472.pdf 27-Jul-2004 10:52 157k Practically secure Feistel ciphers Part_III.pdf 26-Jul-2004 12:58 520k Symmetric Key Cryptography QC.pdf 25-Jul-2004 13:30 1.8M Quantum cryptography RHUL-MA-2001-5.pdf 24-Jul-2004 08:49 501k Design, analysis and applications of cryptographic techniques RSA02.pdf 24-Jul-2004 08:50 855k Mathematiques du secret RSA_hardware_implementation.pdf 25-Jul-2004 13:31 279k RSA Hardware Implementation RabinCryptosystem.txt 24-Jul-2004 11:35 8k Description of the Rabin Public Key Cryptosystem RivestKaliski-RSAProblem.pdf 19-Sep-2004 15:42 97k RSA Problem SaveVig.pdf 26-Jul-2004 13:05 476k Developing a Strong Cipher Simplecrypto.pdf 27-Jul-2004 10:52 42k One-Time Pad SubstGen.pdf 27-Jul-2004 11:03 79k Solving Substitution Ciphers with Genetics Algorithm SurveyAsynchExt.pdf 24-Jul-2004 08:52 149k A Survey of Asynchronous Extensions of Block Cipher Modes of Operation The_simple_ideal_cipher_system.pdf 25-Jul-2004 13:32 104k The simple ideal cipher system TuringPres.pdf 26-Jul-2004 13:09 270k Turing: a fast software stream cipher UserAuth.pdf 25-Jul-2004 13:37 390k User Authentication Principles and Methods Wits00.pdf 24-Jul-2004 13:19 29k On the Perfect Encryption Assumption aes-crypto.pdf 05-Jul-2004 13:55 304k Essential Algebraic Structure Within the AES alibaba.pdf 05-Jul-2004 13:55 227k How To Explain Zero-Knowledge Protocols to Your Children andreas3.pdf 27-Jul-2004 11:06 2.3M How secure is a cipher? arit.pdf 22-Feb-2005 17:05 202k bear-lion.pdf 28-Aug-2004 18:32 152k Two Practical and Provably Secure Block Ciphers: BEAR and LION bit_order.pdf 24-Jul-2004 13:19 66k Input and Output Block Conventions for AES Encryption Algorithms bsa-final-report.txt 24-Jul-2004 11:35 29k Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security c.pdf 25-Jul-2004 13:38 99k Weak Keys cbtwirl.pdf 25-Jul-2004 13:39 118k On the Cost of Factoring RSA-1024 cfs.pdf 07-Jul-2004 23:14 82k A Cryptographic File System for Unix cfskey.pdf 28-Aug-2004 18:32 42k Key Management in an Encrypting File System chaffing-and-winnowing.txt 24-Jul-2004 11:35 25k Chaffing and Winnowing: Confidentiality without Encryption ches99.pdf 25-Jul-2004 13:40 181k A High-Performance Flexible Architecture for Cryptography cmc.pdf 24-Jul-2004 13:20 750k A Tweakable Enciphering Mode cocaine-auction-protocol.pdf 24-Jul-2004 08:52 227k The Cocaine Auction Protocol: On The Power Of Anonymous Broadcast code.pdf 01-Mar-2005 01:02 198k [VM] Explication du code de VM du Linux 2.4 concours_aes.pdf 21-Jul-2004 15:40 471k Analyse des algorithmes finalistes concourant pour le futur standard AES crypt.talk.pdf 24-Jul-2004 08:52 100k DNA-based Cryptography crypto.pdf 01-Mar-2005 01:04 217k analysis algo stegano wordlists crypto_mod.pdf 24-Jul-2004 13:20 173k Mathematical Models in Public-Key Cryptology crypto_moderne.pdf 24-Jul-2004 08:53 205k La cryptologie moderne cryptoanalyse.pdf 25-Jul-2004 13:40 64k Elements de Cryptoanalyse cryptography_new.pdf 24-Jul-2004 08:53 219k An Introduction to Traditional Cryptography and Cryptanalysis for Amateurs cryptosizes.pdf 25-Jul-2004 13:45 438k Selecting Cryptographic Key Sizes cucs-021-04.pdf 27-Jul-2004 10:53 131k Design and Implementation of a Crypto Processor and Its Application to Security System dean02.pdf 25-Jul-2004 13:46 94k Cryptography as a Network Service djalil-crypto.pdf 30-Jun-2004 10:26 157k Quelques mots sur la cryptographie elec6703-2-3.pdf 27-Jul-2004 10:53 60k Encryption Algorithms esm.pdf 27-Jul-2004 10:53 60k A General Encryption Scheme Based on MDS Code essay-037.pdf 25-Jul-2004 13:48 31k Why cryptography is harder than it looks examples.pdf 25-Jul-2004 13:50 37k Some Examples of the PKCS Standards fawkes.pdf 28-Aug-2004 18:32 122k A New Family of Authentication Protocols fox_ujf.pdf 24-Jul-2004 08:54 402k Fox: une nouvelle famille d'algorithmes de chiffrement par bloc fse93.pdf 24-Jul-2004 08:54 77k Performance of Symmetric Ciphers and One-way Hash Functions fusion.pdf 15-Sep-2004 19:45 148k All-Or-Nothing Encryption and The PAckage Transform gladman.pdf 25-Jul-2004 13:50 45k Implementation Experience with AES Candidate Algorithms herys.pdf 27-Jul-2004 10:53 10k Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V high-perf-crypto.pdf 28-Aug-2004 18:43 46k Towards High Performance Cryptographic Software histoire_cryptographie.pdf 24-Jul-2004 08:54 215k Histoire de la cryptographie inc1.pdf 15-Sep-2004 20:51 259k Incremental Cryptography: The Case of Hashing and Signing inc2.pdf 15-Sep-2004 20:52 237k Incremental Cryptography and Application to Virus Protection inchash.pdf 15-Sep-2004 20:53 427k A New Paradigm for Collision-free Hashing Incrementality at Reduced Cost internet-modes.pdf 24-Jul-2004 13:20 62k Cryptographic Modes of Operation for the Internet ipsec.pdf 25-Jul-2004 13:51 216k Weak Keys katmct.pdf 24-Jul-2004 08:54 98k Description of Known Answer Tests and Monte Carlo Tests for AES Candidate Algorithm Submissions key-mngmt-crypto-fs.pdf 24-Jul-2004 08:54 57k Key Management in an Encrypting File System keyrecovery.pdf 25-Jul-2004 13:53 169k The Design and Implementation of Protocol-Based Hidden Key Recovery lars_knudsen.pdf 24-Jul-2004 13:21 301k Contemporary Block Ciphers lpe.pdf 24-Jul-2004 13:21 242k On the Construction of Variable-Input-Length Ciphers marco.pdf 25-Jul-2004 13:55 233k The Future of Cryptography Under Quantum Computers matrices.pdf 25-Jul-2004 13:56 121k Using Matrices for Cryptography md5-vs-sha.txt 24-Jul-2004 11:35 5k A quick comparison on MD5 vs SHA md5_someday.pdf 26-Feb-2005 18:34 55k MD5 To Be Considered Harmful Someday memoire-julien.pdf 30-Jun-2004 10:28 720k Protocoles cryptographiques avec des participants limités en espace mémoire modesv2.pdf 24-Jul-2004 13:22 118k Modes of Operation of a Block Cipher musee.pdf 24-Jul-2004 13:22 718k Un apercu de l'histoire de la cryptologie new_introduction_crypto.pdf 24-Jul-2004 08:55 278k Introduction à la cryptographie oakland.pdf 07-Jul-2004 23:15 263k Cryptographic Key Generation from Voice ocb-full.pdf 24-Jul-2004 13:23 659k OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption ocf.pdf 25-Jul-2004 13:57 133k The Design of the OpenBSD Cryptographic Framework odyssey.pdf 25-Jul-2004 13:58 120k Using Voice to Generate Cryptographic Keys onetime.pdf 26-Jul-2004 13:10 50k One-Time Pad or Vernam Cipher paper716.pdf 26-Feb-2005 18:34 76k Quantum Cryptography: Is your data safe even when somebody looks ? paper722.pdf 26-Feb-2005 18:40 34k The Day DES Died paper723.pdf 26-Feb-2005 18:40 30k Encryption Regulation: A First Amendment Perspective paper724.pdf 26-Feb-2005 18:40 85k Design and Implementation of a Crypto Processor and Its Application to Security System paper726.pdf 26-Feb-2005 18:40 46k One Fish, Twofish, Red Fish, Blowfish - A History of Cryptography and it’s Application in Society paper732.pdf 26-Feb-2005 18:40 33k Who’s Who in AES ? paper735.pdf 26-Feb-2005 18:40 33k Key and Certificate Management in Public Key Infrastructure Technology paper736.pdf 26-Feb-2005 18:34 38k paper737.pdf 26-Feb-2005 18:34 101k Implementing PKI in a Non-Heterogeneous Environment - A Primer on Digital Certificate And Key Formats paper738.pdf 26-Feb-2005 18:34 135k The Weakest Link: The Human Factor - Lessons Learned from the German WWII Enigma Cryptosystem paper740.pdf 26-Feb-2005 18:34 40k AES: The Making of a New Encryption Standard paper751.pdf 26-Feb-2005 18:34 33k A Review of the Diffie-Hellman Algorithm and its Use in Secure Internet Protocols paper764.pdf 26-Feb-2005 18:34 70k Design and Implementation of a Crypto Processor and Its Application to Security System paper768.pdf 26-Feb-2005 18:34 60k S-Box Modifications and Their Effect in DES-like Encryption Systems paper874.pdf 26-Feb-2005 18:34 73k Design and Implementation of a Crypto Processor and Its Application to Security System paper878.pdf 26-Feb-2005 18:34 271k Applied Encryption: Ensuring Integrity of Tactical Data paper879.pdf 26-Feb-2005 18:35 245k An Overview of Cryptographic Hash Functions and Their Uses paper885.pdf 26-Feb-2005 18:34 395k Is the future of cryptography in qubits paper886.pdf 26-Feb-2005 18:34 72k Cryptography: What is secure ? perf.pdf 24-Jul-2004 13:23 179k Cryptographic File Systems Performance: What You Don't Know Can Hurt You pitfalls.pdf 25-Jul-2004 13:59 56k Security Pitfalls In Cryptography preprint_frey.pdf 25-Jul-2004 14:02 336k Mathematical Background of Public Key Cryptography qbsc_2004.pdf 26-Jul-2004 13:11 62k Design and Implementation of a Crypto Processor and Its Application to Security System queensland.pdf 29-Aug-2004 12:42 202k Crypto in Europe - Markets, Law and Policy robustness.pdf 28-Aug-2004 18:32 123k Robustness principles for public key protocols secret_key_cryptography.pdf 25-Jul-2004 14:15 1.1M Secret Key Cryptography shi_asap00.pdf 25-Jul-2004 14:15 63k Bit Permutation Instructions for Accelerating Software Cryptography skipjack-kea.pdf 29-Aug-2004 12:43 214k SKIPJACK and KEA Algorithm Specifications text.pdf 25-Jul-2004 14:20 26k Design and Implementation of Three Cryptographic Systems: DH Key Exchange, DH Digital Signature, RSA thesis-ac.pdf 27-Jul-2004 10:54 668k Weak Keys thesis.pdf 07-Jul-2004 23:17 1.6M Facilitating the Modelling and Automated Analysis of Cryptographic Protocols trapdoor.pdf 27-Jul-2004 10:54 41k A hard problem: Disclosing how to break public key cryptosystems understanding_ssl.pdf 25-Jul-2004 14:21 265k Understanding Digital Certificates and Secure Sockets Layer usenix00.pdf 19-Sep-2004 15:39 293k An Open-source Cryptographic Coprocessor wake.pdf 27-Jul-2004 10:54 150k A Bulk Data Encryption Algorithm
Si tu peux résoudre un problème, quel besoin as tu de t'inquiéter ? Si tu ne peux le résoudre, à quoi bon te faire du souci? [Dalai Lama] |
,------------------------------------------------------------------ | madchat.org # updates # buildtime: 20061031 # donjon files: -===~ | ,------------ /coding/ | The Tao of Programming | ,------------ /coding/ai/games/ | Game AI: The shrinking gap between computer games and AI systems | Making the Human Care: On Building Engaging Bots | ,------------ /coding/ai/games/quake/ | Quake II as a Robotic and Multi-Agent Platform | It Knows What You’re Going To Do: Adding Anticipation to a Quakebot | Intelligent Autonomous Agents in Quake | Quake III : Fun And More - A tutorial introduction to building Quake III mods and more! | The Quake III Arena Bot | ,------------ /esprit/emags/dhmag/ | DOS Help Magazine/Volume 1,Number 01: Shape up your DOS environment, Mixed Language Programming | DOS Help Magazine/Volume 1,Number 02: The PSP, ANSI, opening the CD Tray | DOS Help Magazine/Volume 1,Number 03: Hex2Dec2Bin2Oct, TSR Clock, More File Handles, ERRORLEVEL | DOS Help Magazine/Volume 1,Number 04: Keyboard LED's, Undocumented FORMAT, Reboot, ANSI | DOS Help Magazine/Volume 1,Number 05: Unloading TSR's, Tips and Tricks, Video Hardware | DOS Help Magazine/Volume 1,Number 06: Animation, MASM for Free, Self Replicating Source | ,------------ /esprit/emags/tcdiaries/ | tcdiaries1.zip | tcdiaries2.zip | tcdiaries3.zip | tcpaper1.zip | tcpaper2.zip | tcpaper3.zip | ,------------ /vxdevl/vxsrc/ | Acad.Galaxy | | Win9x.FirstBorn | | Win95.Etymo-Crypt | | I-Worm.PieceByPiece | I-Worm.Alizee | | Win32.Parrot | Win32.Cichosz | Win32.Ramlide | Win32.Enumero | Win32.Nastena | Win32.Nicole | `------------------------------------------------------------------ the Spice expands consciousness / Smuggled by the evil Dr.Gang ._____.___ .______ .______ ._______ .___.__ .______ _____._ : |: \ :_ _ \ :_. ___\: | \ : \ \__ _:| | \ / || . || | || : |/\ | : || . | | :| | |\/ || : || . | || / \| . || : | | | |___| | ||___| ||. ____/ |. _____/|___| ||___| | | | |___| |___| :/ :/ |___| |___| |___| : :->