Files

Una piccola raccolta di files informativi di documentazione varia.
In varie pagine farò (implicitamente o esplicitamente) riferimento a files che si possono trovare in queste aree.
Viene ospitato anche un mirror di ZeroShell (sia l'ultima versione "standard" di Fulvio che la versione "di sviluppo" curata da Renato Moraro).

Display nameordina iconesizeDescrizione
Go up
eccCrittografia a curve ellittiche
identity-based
math
randomkey
TPM
A new identification scheme based on syndrome decoding.pdf118.63 KB
A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications.pdf276.11 KB
a_new_family_of_authentication_protocols.pdf77.82 KB
a_new_NP-complete_problem_and_PK_identification.pdf187.22 KB
A_scalable_grouping_random_key_predistribution_scheme.pdf34.56 KB
ace-iso-2.pdf382.27 KB
bellare94optimal.pdf863.36 KB
Berta_Mann_PP_2002.ps.gz136.6 KB
blass-sensor-public-key-encryption-2005.pdf57.27 KB
Block_ciphers_and_stream_ciphers_-_The_state_of_the_art.pdf204.93 KB
Boyko_-_Exposure-resilient_functions_and_All-or-Nothing_transforms.ps282.92 KB
Boyko_-_On_the_security_properties_of_OAEP_as_an_All-or-Nothing_transform.ps.gz149.81 KB
CBC.doc303.5 KB
chabaud94security.pdf165.2 KB
chan_randomkey.ps371.72 KB
CHES_2004.pdf165.98 KB
cramer98practical.pdf191.93 KB
Cryptanalysis_of_the_Bluetooth_E0_cipher_using_OBDDs.pdf275.89 KB
CS0946_-_Cryptanalysis_of_Skipjack-3XOR.ps242.86 KB
CS0947_-_Cryptanalysis_of_Skipjack_reduced_to_31_rounds.ps.gz73.52 KB
cs3235-3_-_Introduction_to_computer_security.pdf2.59 MB
De Santis-Di Crescenzo-Persiano - Secret sharing and perfect zero knowledge.pdf983.19 KB
DES_-_fips46-3.pdf178.92 KB
DES_differential_attacks.pdf125.45 KB
despicable-1.01.tar.gz16.72 KB
dolev91nonmalleable.pdf348.19 KB
Essential_algebraic_structure_within_the_AES.pdf303.87 KB
Fast pseudo-Hadamard transforma.pdf149.08 KB
fips186-2-change1.pdf312.3 KB
gf-osr.pdf77.82 KB
GroupKey00.ps170.52 KB
hall97reaction.pdf159.85 KB
How_to_achieve_a_McEliece-based_digital_signature_scheme.ps293.81 KB
Information-theoretic secret key agreement.pdf925.01 KB
intelRNG.pdf72.53 KB
Iterative modular multiplication algorithm without magnitude comparison.pdf205.85 KB
Khazad-tweak.zip317.15 KB
laws_of_cryptography_with_java_code.pdf1.08 MB
Leighton-Micali - Secret-key agreement without public-key cryptography [UNSAFE].pdf2.32 MB
Long modular multiplication for cryptographic applications.pdf555.89 KB
luc-0.4.cc24.28 KB
luc-in-bc.tar.gz3.18 KB
luc-paper.pdf77.96 KB
luc-paper.ps.gz70.99 KB
luc_l3-1.3b.tar.gz114.25 KB
luc_vs_rsa.gz2.03 KB
mars-attacks.pdf190.59 KB
mars-HW.pdf113.1 KB
mars.tar.gz2.55 MB
Maurer97.pdf230.62 KB
md5-attack.pdf184.44 KB
minrank_authentication_scheme.pdf250.94 KB
ModMult.pdf555.89 KB
Multiparty_unconditionally_secure_protocols.pdf38.86 KB
Needham_-_Denial_of_service_An_example.pdf2.83 MB
NESSIE_8051cpu_results_2.pdf62.5 KB
NESSIE_final_report.pdf4.53 MB
NESSIE_Khazad_quadratic_relations.pdf80.95 KB
pairing-based_identification_schemes.pdf263.73 KB
PARIZ_PRNG-imp-ver02.pdf213.69 KB
ping-pong.pdf517.38 KB
pkcs-3.ps82.85 KB
pkcs-7.asn9.5 KB
pkcs-7v16.pdf26 KB
Relatedkey_attacks_on_3way_Biham-DES_CAST_DES-X_NewDES_RC2_TEA.pdf189.76 KB
Rivest_-_All-or-Nothing_encryption_and_the_package_transform.pdf149.23 KB
Rivest_-_All-or-Nothing_encryption_and_the_package_transform.ps106.73 KB
runwalk2.pdf483.5 KB
safer.V1.2.tar.Z97.35 KB
Secure group key agreement.pdf1.74 MB
serpent.ps.gz89.46 KB
serpent.tar.gz956.64 KB
Shamir_-_A_polynomial_time_algorithm_for_breaking_Merkle-Hellman_cryptosystem.PDF295.43 KB
skipjack-1.01.tar.gz15.03 KB
skipjack_interim_report.txt18.66 KB
SP800-57-Part1.pdf475.55 KB
tea16.txt9.36 KB
tea16.zip2.53 KB
tea17.txt8.61 KB
tea17.zip2.48 KB
TEA_Cryptanalysis_-_VRAndem.pdf1.73 MB
The random oracle methodology revisited.pdf400.01 KB
tiger-src.tar.gz16.61 KB
tiger.ps103.27 KB
tiger.ps.gz51.33 KB
tiger_-_a_fast_new_hash_function.ps103.27 KB
- 6 dossiers - 86 files - 35.44 MB
Realizzato con Drupal, un sistema open source per la gestione dei contenuti