| Go up | | |
| ecc | | Crittografia a curve ellittiche |
| identity-based | | |
| math | | |
| randomkey | | |
| TPM | | |
| A new identification scheme based on syndrome decoding.pdf | 118.63 KB | |
| A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications.pdf | 276.11 KB | |
| a_new_family_of_authentication_protocols.pdf | 77.82 KB | |
| a_new_NP-complete_problem_and_PK_identification.pdf | 187.22 KB | |
| A_scalable_grouping_random_key_predistribution_scheme.pdf | 34.56 KB | |
| ace-iso-2.pdf | 382.27 KB | |
| bellare94optimal.pdf | 863.36 KB | |
| Berta_Mann_PP_2002.ps.gz | 136.6 KB | |
| blass-sensor-public-key-encryption-2005.pdf | 57.27 KB | |
| Block_ciphers_and_stream_ciphers_-_The_state_of_the_art.pdf | 204.93 KB | |
| Boyko_-_Exposure-resilient_functions_and_All-or-Nothing_transforms.ps | 282.92 KB | |
| Boyko_-_On_the_security_properties_of_OAEP_as_an_All-or-Nothing_transform.ps.gz | 149.81 KB | |
| CBC.doc | 303.5 KB | |
| chabaud94security.pdf | 165.2 KB | |
| chan_randomkey.ps | 371.72 KB | |
| CHES_2004.pdf | 165.98 KB | |
| cramer98practical.pdf | 191.93 KB | |
| Cryptanalysis_of_the_Bluetooth_E0_cipher_using_OBDDs.pdf | 275.89 KB | |
| CS0946_-_Cryptanalysis_of_Skipjack-3XOR.ps | 242.86 KB | |
| CS0947_-_Cryptanalysis_of_Skipjack_reduced_to_31_rounds.ps.gz | 73.52 KB | |
| cs3235-3_-_Introduction_to_computer_security.pdf | 2.59 MB | |
| De Santis-Di Crescenzo-Persiano - Secret sharing and perfect zero knowledge.pdf | 983.19 KB | |
| DES_-_fips46-3.pdf | 178.92 KB | |
| DES_differential_attacks.pdf | 125.45 KB | |
| despicable-1.01.tar.gz | 16.72 KB | |
| dolev91nonmalleable.pdf | 348.19 KB | |
| Essential_algebraic_structure_within_the_AES.pdf | 303.87 KB | |
| Fast pseudo-Hadamard transforma.pdf | 149.08 KB | |
| fips186-2-change1.pdf | 312.3 KB | |
| gf-osr.pdf | 77.82 KB | |
| GroupKey00.ps | 170.52 KB | |
| hall97reaction.pdf | 159.85 KB | |
| How_to_achieve_a_McEliece-based_digital_signature_scheme.ps | 293.81 KB | |
| Information-theoretic secret key agreement.pdf | 925.01 KB | |
| intelRNG.pdf | 72.53 KB | |
| Iterative modular multiplication algorithm without magnitude comparison.pdf | 205.85 KB | |
| Khazad-tweak.zip | 317.15 KB | |
| laws_of_cryptography_with_java_code.pdf | 1.08 MB | |
| Leighton-Micali - Secret-key agreement without public-key cryptography [UNSAFE].pdf | 2.32 MB | |
| Long modular multiplication for cryptographic applications.pdf | 555.89 KB | |
| luc-0.4.cc | 24.28 KB | |
| luc-in-bc.tar.gz | 3.18 KB | |
| luc-paper.pdf | 77.96 KB | |
| luc-paper.ps.gz | 70.99 KB | |
| luc_l3-1.3b.tar.gz | 114.25 KB | |
| luc_vs_rsa.gz | 2.03 KB | |
| mars-attacks.pdf | 190.59 KB | |
| mars-HW.pdf | 113.1 KB | |
| mars.tar.gz | 2.55 MB | |
| Maurer97.pdf | 230.62 KB | |
| md5-attack.pdf | 184.44 KB | |
| minrank_authentication_scheme.pdf | 250.94 KB | |
| ModMult.pdf | 555.89 KB | |
| Multiparty_unconditionally_secure_protocols.pdf | 38.86 KB | |
| Needham_-_Denial_of_service_An_example.pdf | 2.83 MB | |
| NESSIE_8051cpu_results_2.pdf | 62.5 KB | |
| NESSIE_final_report.pdf | 4.53 MB | |
| NESSIE_Khazad_quadratic_relations.pdf | 80.95 KB | |
| pairing-based_identification_schemes.pdf | 263.73 KB | |
| PARIZ_PRNG-imp-ver02.pdf | 213.69 KB | |
| ping-pong.pdf | 517.38 KB | |
| pkcs-3.ps | 82.85 KB | |
| pkcs-7.asn | 9.5 KB | |
| pkcs-7v16.pdf | 26 KB | |
| Relatedkey_attacks_on_3way_Biham-DES_CAST_DES-X_NewDES_RC2_TEA.pdf | 189.76 KB | |
| Rivest_-_All-or-Nothing_encryption_and_the_package_transform.pdf | 149.23 KB | |
| Rivest_-_All-or-Nothing_encryption_and_the_package_transform.ps | 106.73 KB | |
| runwalk2.pdf | 483.5 KB | |
| safer.V1.2.tar.Z | 97.35 KB | |
| Secure group key agreement.pdf | 1.74 MB | |
| serpent.ps.gz | 89.46 KB | |
| serpent.tar.gz | 956.64 KB | |
| Shamir_-_A_polynomial_time_algorithm_for_breaking_Merkle-Hellman_cryptosystem.PDF | 295.43 KB | |
| skipjack-1.01.tar.gz | 15.03 KB | |
| skipjack_interim_report.txt | 18.66 KB | |
| SP800-57-Part1.pdf | 475.55 KB | |
| tea16.txt | 9.36 KB | |
| tea16.zip | 2.53 KB | |
| tea17.txt | 8.61 KB | |
| tea17.zip | 2.48 KB | |
| TEA_Cryptanalysis_-_VRAndem.pdf | 1.73 MB | |
| The random oracle methodology revisited.pdf | 400.01 KB | |
| tiger-src.tar.gz | 16.61 KB | |
| tiger.ps | 103.27 KB | |
| tiger.ps.gz | 51.33 KB | |
| tiger_-_a_fast_new_hash_function.ps | 103.27 KB | |