 | Go up | | |
 | ecc | | Crittografia a curve ellittiche |
 | identity-based | | |
 | math | | |
 | randomkey | | |
 | TPM | | |
 | A new identification scheme based on syndrome decoding.pdf | 118.63 KB | |
 | A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications.pdf | 276.11 KB | |
 | a_new_family_of_authentication_protocols.pdf | 77.82 KB | |
 | a_new_NP-complete_problem_and_PK_identification.pdf | 187.22 KB | |
 | A_scalable_grouping_random_key_predistribution_scheme.pdf | 34.56 KB | |
 | ace-iso-2.pdf | 382.27 KB | |
 | bellare94optimal.pdf | 863.36 KB | |
 | Berta_Mann_PP_2002.ps.gz | 136.6 KB | |
 | blass-sensor-public-key-encryption-2005.pdf | 57.27 KB | |
 | Block_ciphers_and_stream_ciphers_-_The_state_of_the_art.pdf | 204.93 KB | |
 | Boyko_-_Exposure-resilient_functions_and_All-or-Nothing_transforms.ps | 282.92 KB | |
 | Boyko_-_On_the_security_properties_of_OAEP_as_an_All-or-Nothing_transform.ps.gz | 149.81 KB | |
 | CBC.doc | 303.5 KB | |
 | chabaud94security.pdf | 165.2 KB | |
 | chan_randomkey.ps | 371.72 KB | |
 | CHES_2004.pdf | 165.98 KB | |
 | cramer98practical.pdf | 191.93 KB | |
 | Cryptanalysis_of_the_Bluetooth_E0_cipher_using_OBDDs.pdf | 275.89 KB | |
 | CS0946_-_Cryptanalysis_of_Skipjack-3XOR.ps | 242.86 KB | |
 | CS0947_-_Cryptanalysis_of_Skipjack_reduced_to_31_rounds.ps.gz | 73.52 KB | |
 | cs3235-3_-_Introduction_to_computer_security.pdf | 2.59 MB | |
 | De Santis-Di Crescenzo-Persiano - Secret sharing and perfect zero knowledge.pdf | 983.19 KB | |
 | DES_-_fips46-3.pdf | 178.92 KB | |
 | DES_differential_attacks.pdf | 125.45 KB | |
 | despicable-1.01.tar.gz | 16.72 KB | |
 | dolev91nonmalleable.pdf | 348.19 KB | |
 | Essential_algebraic_structure_within_the_AES.pdf | 303.87 KB | |
 | Fast pseudo-Hadamard transforma.pdf | 149.08 KB | |
 | fips186-2-change1.pdf | 312.3 KB | |
 | gf-osr.pdf | 77.82 KB | |
 | GroupKey00.ps | 170.52 KB | |
 | hall97reaction.pdf | 159.85 KB | |
 | How_to_achieve_a_McEliece-based_digital_signature_scheme.ps | 293.81 KB | |
 | Information-theoretic secret key agreement.pdf | 925.01 KB | |
 | intelRNG.pdf | 72.53 KB | |
 | Iterative modular multiplication algorithm without magnitude comparison.pdf | 205.85 KB | |
 | Khazad-tweak.zip | 317.15 KB | |
 | laws_of_cryptography_with_java_code.pdf | 1.08 MB | |
 | Leighton-Micali - Secret-key agreement without public-key cryptography [UNSAFE].pdf | 2.32 MB | |
 | Long modular multiplication for cryptographic applications.pdf | 555.89 KB | |
 | luc-0.4.cc | 24.28 KB | |
 | luc-in-bc.tar.gz | 3.18 KB | |
 | luc-paper.pdf | 77.96 KB | |
 | luc-paper.ps.gz | 70.99 KB | |
 | luc_l3-1.3b.tar.gz | 114.25 KB | |
 | luc_vs_rsa.gz | 2.03 KB | |
 | mars-attacks.pdf | 190.59 KB | |
 | mars-HW.pdf | 113.1 KB | |
 | mars.tar.gz | 2.55 MB | |
 | Maurer97.pdf | 230.62 KB | |
 | md5-attack.pdf | 184.44 KB | |
 | minrank_authentication_scheme.pdf | 250.94 KB | |
 | ModMult.pdf | 555.89 KB | |
 | Multiparty_unconditionally_secure_protocols.pdf | 38.86 KB | |
 | Needham_-_Denial_of_service_An_example.pdf | 2.83 MB | |
 | NESSIE_8051cpu_results_2.pdf | 62.5 KB | |
 | NESSIE_final_report.pdf | 4.53 MB | |
 | NESSIE_Khazad_quadratic_relations.pdf | 80.95 KB | |
 | pairing-based_identification_schemes.pdf | 263.73 KB | |
 | PARIZ_PRNG-imp-ver02.pdf | 213.69 KB | |
 | ping-pong.pdf | 517.38 KB | |
 | pkcs-3.ps | 82.85 KB | |
 | pkcs-7.asn | 9.5 KB | |
 | pkcs-7v16.pdf | 26 KB | |
 | Relatedkey_attacks_on_3way_Biham-DES_CAST_DES-X_NewDES_RC2_TEA.pdf | 189.76 KB | |
 | Rivest_-_All-or-Nothing_encryption_and_the_package_transform.pdf | 149.23 KB | |
 | Rivest_-_All-or-Nothing_encryption_and_the_package_transform.ps | 106.73 KB | |
 | runwalk2.pdf | 483.5 KB | |
 | safer.V1.2.tar.Z | 97.35 KB | |
 | Secure group key agreement.pdf | 1.74 MB | |
 | serpent.ps.gz | 89.46 KB | |
 | serpent.tar.gz | 956.64 KB | |
 | Shamir_-_A_polynomial_time_algorithm_for_breaking_Merkle-Hellman_cryptosystem.PDF | 295.43 KB | |
 | skipjack-1.01.tar.gz | 15.03 KB | |
 | skipjack_interim_report.txt | 18.66 KB | |
 | SP800-57-Part1.pdf | 475.55 KB | |
 | tea16.txt | 9.36 KB | |
 | tea16.zip | 2.53 KB | |
 | tea17.txt | 8.61 KB | |
 | tea17.zip | 2.48 KB | |
 | TEA_Cryptanalysis_-_VRAndem.pdf | 1.73 MB | |
 | The random oracle methodology revisited.pdf | 400.01 KB | |
 | tiger-src.tar.gz | 16.61 KB | |
 | tiger.ps | 103.27 KB | |
 | tiger.ps.gz | 51.33 KB | |
 | tiger_-_a_fast_new_hash_function.ps | 103.27 KB | |