Name                                                             Last modified       Size  Description

[FOLDER] Parent Directory 14-May-2005 22:46 - Agonizing Memories [txt] 00-cnam-cryptographie.pdf 30-Jun-2004 10:14 199k Les Techniques De Cryptographie [txt] 007.pdf 26-Feb-2005 18:34 143k The Misuse of RC4 in Microsoft Word and Excel [txt] 013-jgl.pdf 24-Jul-2004 13:18 272k Vérification de protocoles cryptographiques [txt] 0501038.pdf 26-Feb-2005 18:34 105k Data Tastes Better Seasoned: Introducing the ASH Family of Hashing Algorithms [txt] 061.pdf 24-Jul-2004 13:18 70k Strengthened Encryption in the CBC Mode [txt] 075.pdf 26-Jul-2004 12:10 127k An Hybrid Mode of Operation [txt] 0764541889.pdf 05-Jul-2004 13:54 241k A Primer on Crypto Basics [txt] 126.pdf 24-Jul-2004 08:45 337k Certificateless Public Key Cryptography [txt] 144.pdf 24-Jul-2004 08:45 81k ID-based tripartite key agreement with signatures [txt] 147.pdf 24-Jul-2004 08:45 314k A Parallelizable Enciphering Mode [txt] 148.pdf 24-Jul-2004 08:46 245k The EMD Mode of Operation (A Tweaked, Wide-Blocksize, Strong PRP) [txt] 199.pdf 26-Feb-2005 18:34 56k Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD [txt] 1995meadows-asiacrypt94.pdf 07-Jul-2004 23:14 134k Formal Verification of Cryptographic Protocols: A Survey [txt] 2001_goodman_jssc.pdf 25-Jul-2004 13:04 440k An Energy-Efficient Reconfigurable Public-Key Cryptography Processor [txt] 2002_HDRThesis-US.pdf 24-Jul-2004 08:48 1.7M Le Chiffrement Asymetrique et la Securite Prouvee [txt] 2004_sac_A4.pdf 26-Jul-2004 12:14 207k Design and Implementation of a Crypto Processor and Its Application to Security System [TXT] 20thCenturyCryptoSpeech.txt 24-Jul-2004 11:35 25k The Five Great Inventions of Twentieth Century Cryptography [txt] 4.pdf 24-Jul-2004 13:19 466k Design and Implementation of a Crypto Processor and Its Application to Security System [txt] AB-9800.pdf 25-Jul-2004 13:06 233k Recent Developments in the Design of Conventional Cryptographic Algorithms [TXT] AES Algorithm Efficiency.html 11-Nov-2004 20:01 72k AES Algorithm Efficiency [TXT] AFP-crypto-liberee.html 17-Jan-2003 07:00 2k L'usage de la cryptologie va en outre devenir totalement libre [txt] AGPS_01OCFB-paper.pdf 26-Jul-2004 12:18 279k Optimized Self-Synchronizing Mode of Operation [txt] BRICS-RS-94-38.pdf 27-Jul-2004 10:52 293k Enhancing the Strength of Conventional Cryptosystems [txt] CHJ_02ge.pdf 26-Jul-2004 12:26 275k GEM: a Generic Chosen-Ciphertext Secure Encryption Method [txt] CSE-97-15.pdf 26-Jul-2004 12:32 466k The Security of the Cipher Block Chaining Message Authentication Code [txt] Chap_07.pdf 24-Jul-2004 08:48 167k Cryptologie [txt] Cryptography-1.pdf 25-Jul-2004 13:08 73k Cryptography: Public Key Cryptography; Mathematical Preliminaries [txt] Cryptography-3.pdf 26-Jul-2004 12:34 72k Cryptography: RSA Encryption and Decryption [TXT] CypherpunkManifesto.txt 28-Aug-2004 18:31 5k A Cypherpunk's Manifesto by Eric Hughes [txt] DPA.pdf 25-Jul-2004 13:10 217k Differential Power Analysis [txt] FeteSc.pdf 24-Jul-2004 13:19 160k Arithmétique et cryptologie [txt] Grund_Symmetric-Cryptography_Paper.pdf 24-Jul-2004 08:48 367k Symmetric Cryptography [txt] HAVAL_paper.pdf 29-Aug-2004 12:40 268k HAVAL - A One-Way Hashing Algorithm with Variable Length of Output [txt] I22Diff.pdf 25-Jul-2004 13:10 8k The Export of Cryptography in the 20th Century and the 21st [txt] I2_cryptologie.pdf 30-Jun-2004 10:15 64k Introduction à la cryptologie et aux cryptosystèmes [txt] IC_TECH_REPORT_199938.pdf 25-Jul-2004 13:12 183k Formal methods in the design of cryptographic protocols [txt] IDEA_0304.pdf 25-Jul-2004 13:14 308k Design and Implementation of a Crypto Processor and Its Application to Security System [txt] IntroCrypto_fr.pdf 30-Jun-2004 10:23 2.8M Introduction à la cryptographie [txt] LeeShiYinRivestRobshaw-OnPermutationOperationsInCipherDesign.pdf 26-Jul-2004 12:41 115k On Permutation Operations in Cipher Design [txt] LinuxChiffrement.pdf 30-Jun-2004 10:25 399k Chiffrement de données sous GNU/Linux [txt] NMWd95ca.pdf 05-Jul-2004 13:54 105k Are Crypto-Accelerators Really Inevitable? [txt] NT.pdf 25-Jul-2004 13:16 240k Number Theory and Cryptography [txt] Nac95abs.pdf 07-Jul-2004 23:14 87k Signatures numeriques et preuves a divulgation nulle, cryptanalyse, defense et outils algorithmiques [txt] PB-472.pdf 27-Jul-2004 10:52 157k Practically secure Feistel ciphers [txt] Part_III.pdf 26-Jul-2004 12:58 520k Symmetric Key Cryptography [txt] QC.pdf 25-Jul-2004 13:30 1.8M Quantum cryptography [txt] RHUL-MA-2001-5.pdf 24-Jul-2004 08:49 501k Design, analysis and applications of cryptographic techniques [txt] RSA02.pdf 24-Jul-2004 08:50 855k Mathematiques du secret [txt] RSA_hardware_implementation.pdf 25-Jul-2004 13:31 279k RSA Hardware Implementation [TXT] RabinCryptosystem.txt 24-Jul-2004 11:35 8k Description of the Rabin Public Key Cryptosystem [txt] RivestKaliski-RSAProblem.pdf 19-Sep-2004 15:42 97k RSA Problem [txt] SaveVig.pdf 26-Jul-2004 13:05 476k Developing a Strong Cipher [txt] Simplecrypto.pdf 27-Jul-2004 10:52 42k One-Time Pad [txt] SubstGen.pdf 27-Jul-2004 11:03 79k Solving Substitution Ciphers with Genetics Algorithm [txt] SurveyAsynchExt.pdf 24-Jul-2004 08:52 149k A Survey of Asynchronous Extensions of Block Cipher Modes of Operation [txt] The_simple_ideal_cipher_system.pdf 25-Jul-2004 13:32 104k The simple ideal cipher system [txt] TuringPres.pdf 26-Jul-2004 13:09 270k Turing: a fast software stream cipher [txt] UserAuth.pdf 25-Jul-2004 13:37 390k User Authentication Principles and Methods [txt] Wits00.pdf 24-Jul-2004 13:19 29k On the Perfect Encryption Assumption [txt] aes-crypto.pdf 05-Jul-2004 13:55 304k Essential Algebraic Structure Within the AES [txt] alibaba.pdf 05-Jul-2004 13:55 227k How To Explain Zero-Knowledge Protocols to Your Children [txt] andreas3.pdf 27-Jul-2004 11:06 2.3M How secure is a cipher? [txt] arit.pdf 22-Feb-2005 17:05 202k [txt] bear-lion.pdf 28-Aug-2004 18:32 152k Two Practical and Provably Secure Block Ciphers: BEAR and LION [txt] bit_order.pdf 24-Jul-2004 13:19 66k Input and Output Block Conventions for AES Encryption Algorithms [TXT] bsa-final-report.txt 24-Jul-2004 11:35 29k Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security [txt] c.pdf 25-Jul-2004 13:38 99k Weak Keys [txt] cbtwirl.pdf 25-Jul-2004 13:39 118k On the Cost of Factoring RSA-1024 [txt] cfs.pdf 07-Jul-2004 23:14 82k A Cryptographic File System for Unix [txt] cfskey.pdf 28-Aug-2004 18:32 42k Key Management in an Encrypting File System [TXT] chaffing-and-winnowing.txt 24-Jul-2004 11:35 25k Chaffing and Winnowing: Confidentiality without Encryption [txt] ches99.pdf 25-Jul-2004 13:40 181k A High-Performance Flexible Architecture for Cryptography [txt] cmc.pdf 24-Jul-2004 13:20 750k A Tweakable Enciphering Mode [txt] cocaine-auction-protocol.pdf 24-Jul-2004 08:52 227k The Cocaine Auction Protocol: On The Power Of Anonymous Broadcast [txt] code.pdf 01-Mar-2005 01:02 198k [VM] Explication du code de VM du Linux 2.4 [txt] concours_aes.pdf 21-Jul-2004 15:40 471k Analyse des algorithmes finalistes concourant pour le futur standard AES [txt] crypt.talk.pdf 24-Jul-2004 08:52 100k DNA-based Cryptography [txt] crypto.pdf 01-Mar-2005 01:04 217k analysis algo stegano wordlists [txt] crypto_mod.pdf 24-Jul-2004 13:20 173k Mathematical Models in Public-Key Cryptology [txt] crypto_moderne.pdf 24-Jul-2004 08:53 205k La cryptologie moderne [txt] cryptoanalyse.pdf 25-Jul-2004 13:40 64k Elements de Cryptoanalyse [txt] cryptography_new.pdf 24-Jul-2004 08:53 219k An Introduction to Traditional Cryptography and Cryptanalysis for Amateurs [txt] cryptosizes.pdf 25-Jul-2004 13:45 438k Selecting Cryptographic Key Sizes [txt] cucs-021-04.pdf 27-Jul-2004 10:53 131k Design and Implementation of a Crypto Processor and Its Application to Security System [txt] dean02.pdf 25-Jul-2004 13:46 94k Cryptography as a Network Service [txt] djalil-crypto.pdf 30-Jun-2004 10:26 157k Quelques mots sur la cryptographie [txt] elec6703-2-3.pdf 27-Jul-2004 10:53 60k Encryption Algorithms [txt] esm.pdf 27-Jul-2004 10:53 60k A General Encryption Scheme Based on MDS Code [txt] essay-037.pdf 25-Jul-2004 13:48 31k Why cryptography is harder than it looks [txt] examples.pdf 25-Jul-2004 13:50 37k Some Examples of the PKCS Standards [txt] fawkes.pdf 28-Aug-2004 18:32 122k A New Family of Authentication Protocols [txt] fox_ujf.pdf 24-Jul-2004 08:54 402k Fox: une nouvelle famille d'algorithmes de chiffrement par bloc [txt] fse93.pdf 24-Jul-2004 08:54 77k Performance of Symmetric Ciphers and One-way Hash Functions [txt] fusion.pdf 15-Sep-2004 19:45 148k All-Or-Nothing Encryption and The PAckage Transform [txt] gladman.pdf 25-Jul-2004 13:50 45k Implementation Experience with AES Candidate Algorithms [txt] herys.pdf 27-Jul-2004 10:53 10k Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V [txt] high-perf-crypto.pdf 28-Aug-2004 18:43 46k Towards High Performance Cryptographic Software [txt] histoire_cryptographie.pdf 24-Jul-2004 08:54 215k Histoire de la cryptographie [txt] inc1.pdf 15-Sep-2004 20:51 259k Incremental Cryptography: The Case of Hashing and Signing [txt] inc2.pdf 15-Sep-2004 20:52 237k Incremental Cryptography and Application to Virus Protection [txt] inchash.pdf 15-Sep-2004 20:53 427k A New Paradigm for Collision-free Hashing Incrementality at Reduced Cost [txt] internet-modes.pdf 24-Jul-2004 13:20 62k Cryptographic Modes of Operation for the Internet [txt] ipsec.pdf 25-Jul-2004 13:51 216k Weak Keys [txt] katmct.pdf 24-Jul-2004 08:54 98k Description of Known Answer Tests and Monte Carlo Tests for AES Candidate Algorithm Submissions [txt] key-mngmt-crypto-fs.pdf 24-Jul-2004 08:54 57k Key Management in an Encrypting File System [txt] keyrecovery.pdf 25-Jul-2004 13:53 169k The Design and Implementation of Protocol-Based Hidden Key Recovery [txt] lars_knudsen.pdf 24-Jul-2004 13:21 301k Contemporary Block Ciphers [txt] lpe.pdf 24-Jul-2004 13:21 242k On the Construction of Variable-Input-Length Ciphers [txt] marco.pdf 25-Jul-2004 13:55 233k The Future of Cryptography Under Quantum Computers [txt] matrices.pdf 25-Jul-2004 13:56 121k Using Matrices for Cryptography [TXT] md5-vs-sha.txt 24-Jul-2004 11:35 5k A quick comparison on MD5 vs SHA [txt] md5_someday.pdf 26-Feb-2005 18:34 55k MD5 To Be Considered Harmful Someday [txt] memoire-julien.pdf 30-Jun-2004 10:28 720k Protocoles cryptographiques avec des participants limités en espace mémoire [txt] modesv2.pdf 24-Jul-2004 13:22 118k Modes of Operation of a Block Cipher [txt] musee.pdf 24-Jul-2004 13:22 718k Un apercu de l'histoire de la cryptologie [txt] new_introduction_crypto.pdf 24-Jul-2004 08:55 278k Introduction à la cryptographie [txt] oakland.pdf 07-Jul-2004 23:15 263k Cryptographic Key Generation from Voice [txt] ocb-full.pdf 24-Jul-2004 13:23 659k OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption [txt] ocf.pdf 25-Jul-2004 13:57 133k The Design of the OpenBSD Cryptographic Framework [txt] odyssey.pdf 25-Jul-2004 13:58 120k Using Voice to Generate Cryptographic Keys [txt] onetime.pdf 26-Jul-2004 13:10 50k One-Time Pad or Vernam Cipher [txt] paper716.pdf 26-Feb-2005 18:34 76k Quantum Cryptography: Is your data safe even when somebody looks ? [txt] paper722.pdf 26-Feb-2005 18:40 34k The Day DES Died [txt] paper723.pdf 26-Feb-2005 18:40 30k Encryption Regulation: A First Amendment Perspective [txt] paper724.pdf 26-Feb-2005 18:40 85k Design and Implementation of a Crypto Processor and Its Application to Security System [txt] paper726.pdf 26-Feb-2005 18:40 46k One Fish, Twofish, Red Fish, Blowfish - A History of Cryptography and it’s Application in Society [txt] paper732.pdf 26-Feb-2005 18:40 33k Who’s Who in AES ? [txt] paper735.pdf 26-Feb-2005 18:40 33k Key and Certificate Management in Public Key Infrastructure Technology [txt] paper736.pdf 26-Feb-2005 18:34 38k [txt] paper737.pdf 26-Feb-2005 18:34 101k Implementing PKI in a Non-Heterogeneous Environment - A Primer on Digital Certificate And Key Formats [txt] paper738.pdf 26-Feb-2005 18:34 135k The Weakest Link: The Human Factor - Lessons Learned from the German WWII Enigma Cryptosystem [txt] paper740.pdf 26-Feb-2005 18:34 40k AES: The Making of a New Encryption Standard [txt] paper751.pdf 26-Feb-2005 18:34 33k A Review of the Diffie-Hellman Algorithm and its Use in Secure Internet Protocols [txt] paper764.pdf 26-Feb-2005 18:34 70k Design and Implementation of a Crypto Processor and Its Application to Security System [txt] paper768.pdf 26-Feb-2005 18:34 60k S-Box Modifications and Their Effect in DES-like Encryption Systems [txt] paper874.pdf 26-Feb-2005 18:34 73k Design and Implementation of a Crypto Processor and Its Application to Security System [txt] paper878.pdf 26-Feb-2005 18:34 271k Applied Encryption: Ensuring Integrity of Tactical Data [txt] paper879.pdf 26-Feb-2005 18:35 245k An Overview of Cryptographic Hash Functions and Their Uses [txt] paper885.pdf 26-Feb-2005 18:34 395k Is the future of cryptography in qubits [txt] paper886.pdf 26-Feb-2005 18:34 72k Cryptography: What is secure ? [txt] perf.pdf 24-Jul-2004 13:23 179k Cryptographic File Systems Performance: What You Don't Know Can Hurt You [txt] pitfalls.pdf 25-Jul-2004 13:59 56k Security Pitfalls In Cryptography [txt] preprint_frey.pdf 25-Jul-2004 14:02 336k Mathematical Background of Public Key Cryptography [txt] qbsc_2004.pdf 26-Jul-2004 13:11 62k Design and Implementation of a Crypto Processor and Its Application to Security System [txt] queensland.pdf 29-Aug-2004 12:42 202k Crypto in Europe - Markets, Law and Policy [txt] robustness.pdf 28-Aug-2004 18:32 123k Robustness principles for public key protocols [txt] secret_key_cryptography.pdf 25-Jul-2004 14:15 1.1M Secret Key Cryptography [txt] shi_asap00.pdf 25-Jul-2004 14:15 63k Bit Permutation Instructions for Accelerating Software Cryptography [txt] skipjack-kea.pdf 29-Aug-2004 12:43 214k SKIPJACK and KEA Algorithm Specifications [txt] text.pdf 25-Jul-2004 14:20 26k Design and Implementation of Three Cryptographic Systems: DH Key Exchange, DH Digital Signature, RSA [txt] thesis-ac.pdf 27-Jul-2004 10:54 668k Weak Keys [txt] thesis.pdf 07-Jul-2004 23:17 1.6M Facilitating the Modelling and Automated Analysis of Cryptographic Protocols [txt] trapdoor.pdf 27-Jul-2004 10:54 41k A hard problem: Disclosing how to break public key cryptosystems [txt] understanding_ssl.pdf 25-Jul-2004 14:21 265k Understanding Digital Certificates and Secure Sockets Layer [txt] usenix00.pdf 19-Sep-2004 15:39 293k An Open-source Cryptographic Coprocessor [txt] wake.pdf 27-Jul-2004 10:54 150k A Bulk Data Encryption Algorithm

Si tu peux résoudre un problème, quel besoin as tu de t'inquiéter ? Si tu ne peux le résoudre, à quoi bon te faire du souci? [Dalai Lama]
 
,------------------------------------------------------------------
| madchat.org # updates # buildtime: 20061031 # donjon files: -===~
| 
,------------ /coding/
| The Tao of Programming
|
,------------ /coding/ai/games/
| Game AI: The shrinking gap between computer games and AI systems
| Making the Human Care: On Building Engaging Bots
|
,------------ /coding/ai/games/quake/
| Quake II as a Robotic and Multi-Agent Platform
| It Knows What You’re Going To Do: Adding Anticipation to a Quakebot
| Intelligent Autonomous Agents in Quake
| Quake III : Fun And More - A tutorial introduction to building Quake III mods and more!
| The Quake III Arena Bot
|
,------------ /esprit/emags/dhmag/
| DOS Help Magazine/Volume 1,Number 01: Shape up your DOS environment, Mixed Language Programming
| DOS Help Magazine/Volume 1,Number 02: The PSP, ANSI, opening the CD Tray
| DOS Help Magazine/Volume 1,Number 03: Hex2Dec2Bin2Oct, TSR Clock, More File Handles, ERRORLEVEL
| DOS Help Magazine/Volume 1,Number 04: Keyboard LED's, Undocumented FORMAT, Reboot, ANSI
| DOS Help Magazine/Volume 1,Number 05: Unloading TSR's, Tips and Tricks, Video Hardware
| DOS Help Magazine/Volume 1,Number 06: Animation, MASM for Free, Self Replicating Source
|
,------------ /esprit/emags/tcdiaries/
| tcdiaries1.zip
| tcdiaries2.zip
| tcdiaries3.zip
| tcpaper1.zip
| tcpaper2.zip
| tcpaper3.zip
|
,------------ /vxdevl/vxsrc/
| Acad.Galaxy        
|
| Win9x.FirstBorn
|
| Win95.Etymo-Crypt
|
| I-Worm.PieceByPiece
| I-Worm.Alizee  
|
| Win32.Parrot
| Win32.Cichosz       
| Win32.Ramlide
| Win32.Enumero 
| Win32.Nastena       
| Win32.Nicole        
|
`------------------------------------------------------------------

 
the Spice expands consciousness / Smuggled by the evil Dr.Gang
      ._____.___ .______  .______  ._______ .___.__  .______  _____._
      :         |:      \ :_ _   \ :_.  ___\:   |  \ :      \ \__ _:|
      |   \  /  ||   .   ||   |   ||  : |/\ |   :   ||   .   |  |  :|
      |   |\/   ||   :   || . |   ||    /  \|   .   ||   :   |  |   |
      |___| |   ||___|   ||. ____/ |. _____/|___|   ||___|   |  |   |
            |___|    |___| :/       :/          |___|    |___|  |___|
                           :        :->