And my soul from out that shadow that lies floating on the floor shall be lifted - nevermore ! -- Edgar Allan Poe

Index of /madchat/crypto/papers/

Icon  Name                                                             Last modified      Size  Description
[PARENTDIR] Parent Directory - [DIR] archives/ 2015-10-13 21:56 - [   ] 00-cnam-cryptographie.pdf 2009-02-03 20:31 199K [   ] 007.pdf 2009-02-03 20:31 143K [   ] 013-jgl.pdf 2009-02-03 20:31 272K [   ] 0501038.pdf 2009-02-03 20:31 105K [   ] 061.pdf 2009-02-03 20:31 70K [   ] 075.pdf 2009-02-03 20:31 127K [   ] 0764541889.pdf 2009-02-03 20:31 241K [   ] 4.pdf 2009-02-03 20:31 466K [TXT] 20thCenturyCryptoSpeech.txt 2009-02-03 20:31 25K [   ] 126.pdf 2009-02-03 20:31 337K [   ] 144.pdf 2009-02-03 20:31 81K [   ] 147.pdf 2009-02-03 20:31 314K [   ] 148.pdf 2009-02-03 20:31 245K [   ] 199.pdf 2009-02-03 20:31 56K [   ] 1995meadows-asiacrypt94.pdf 2009-02-03 20:31 134K [   ] 2001_goodman_jssc.pdf 2009-02-03 20:31 440K [   ] 2002_HDRThesis-US.pdf 2009-02-03 20:31 1.7M [   ] 2004_sac_A4.pdf 2009-02-03 20:31 207K [   ] AB-9800.pdf 2009-02-03 20:31 233K [TXT] AES_Algorithm_Efficiency.html 2009-02-03 20:31 72K [TXT] AFP-crypto-liberee.html 2009-02-03 20:31 2.0K [   ] AGPS_01OCFB-paper.pdf 2009-02-03 20:31 279K [   ] BRICS-RS-94-38.pdf 2009-02-03 20:31 293K [   ] CHJ_02ge.pdf 2009-02-03 20:31 275K [   ] CSE-97-15.pdf 2009-02-03 20:31 466K [   ] Chap_07.pdf 2009-02-03 20:31 167K [   ] Cryptography-1.pdf 2009-02-03 20:31 73K [   ] Cryptography-3.pdf 2009-02-03 20:31 72K [TXT] CypherpunkManifesto.txt 2009-02-03 20:31 5.2K [   ] DPA.pdf 2009-02-03 20:31 217K [   ] FeteSc.pdf 2009-02-03 20:31 160K [   ] Grund_Symmetric-Cryptography_Paper.pdf 2009-02-03 20:31 367K [   ] HAVAL_paper.pdf 2009-02-03 20:31 268K [   ] I2_cryptologie.pdf 2009-02-03 20:31 64K [   ] I22Diff.pdf 2009-02-03 20:31 7.9K [   ] IC_TECH_REPORT_199938.pdf 2009-02-03 20:31 183K [   ] IDEA_0304.pdf 2009-02-03 20:31 308K [   ] IntroCrypto_fr.pdf 2009-02-03 20:31 2.8M [   ] LeeShiYinRivestRobshaw-OnPermutationOperationsInCipherDesign.pdf 2009-02-03 20:31 115K [   ] LinuxChiffrement.pdf 2009-02-03 20:31 399K [   ] NMWd95ca.pdf 2009-02-03 20:31 105K [   ] NT.pdf 2009-02-03 20:31 240K [   ] Nac95abs.pdf 2009-02-03 20:31 87K [   ] NewsKeyRecoverySVV10.pdf 2011-03-03 13:10 932K [   ] PB-472.pdf 2009-02-03 20:31 157K [   ] Part_III.pdf 2009-02-03 20:31 520K [   ] QC.pdf 2009-02-03 20:31 1.8M [   ] RHUL-MA-2001-5.pdf 2009-02-03 20:31 501K [   ] RSA02.pdf 2009-02-03 20:31 855K [   ] RSA_hardware_implementation.pdf 2009-02-03 20:31 279K [TXT] RabinCryptosystem.txt 2009-02-03 20:31 8.2K [   ] RivestKaliski-RSAProblem.pdf 2009-02-03 20:31 97K [   ] SaveVig.pdf 2009-02-03 20:31 476K [   ] Simplecrypto.pdf 2009-02-03 20:31 42K [   ] SubstGen.pdf 2009-02-03 20:31 79K [   ] SurveyAsynchExt.pdf 2009-02-03 20:31 149K [   ] The_simple_ideal_cipher_system.pdf 2009-02-03 20:31 104K [   ] TuringPres.pdf 2009-02-03 20:31 270K [   ] UserAuth.pdf 2009-02-03 20:31 390K [   ] Wits00.pdf 2009-02-03 20:31 29K [   ] aes-crypto.pdf 2009-02-03 20:31 304K [   ] alibaba.pdf 2009-02-03 20:31 227K [   ] andreas3.pdf 2009-02-03 20:31 2.3M [   ] arit.pdf 2009-02-03 20:31 202K [   ] bear-lion.pdf 2009-02-03 20:31 152K [   ] bit_order.pdf 2009-02-03 20:31 66K [TXT] bsa-final-report.txt 2009-02-03 20:31 29K [   ] c.pdf 2009-02-03 20:31 99K [   ] cbtwirl.pdf 2009-02-03 20:31 118K [   ] cfs.pdf 2009-02-03 20:31 82K [   ] cfskey.pdf 2009-02-03 20:31 42K [TXT] chaffing-and-winnowing.txt 2009-02-03 20:31 25K [   ] ches99.pdf 2009-02-03 20:31 181K [   ] cmc.pdf 2009-02-03 20:31 750K [   ] cocaine-auction-protocol.pdf 2009-02-03 20:31 227K [   ] code.pdf 2009-02-03 20:31 198K [   ] concours_aes.pdf 2009-02-03 20:31 471K [   ] crypt.talk.pdf 2009-02-03 20:31 100K [   ] crypto.pdf 2009-02-03 20:31 217K [   ] crypto_mod.pdf 2009-02-03 20:31 173K [   ] crypto_moderne.pdf 2009-02-03 20:31 205K [   ] cryptoanalyse.pdf 2009-02-03 20:31 64K [   ] cryptography_new.pdf 2009-02-03 20:31 219K [   ] cryptosizes.pdf 2009-02-03 20:31 438K [   ] cucs-021-04.pdf 2009-02-03 20:31 131K [   ] dean02.pdf 2009-02-03 20:31 94K [   ] djalil-crypto.pdf 2009-02-03 20:31 157K [   ] elec6703-2-3.pdf 2009-02-03 20:31 60K [   ] esm.pdf 2009-02-03 20:31 60K [   ] essay-037.pdf 2009-02-03 20:31 31K [   ] examples.pdf 2009-02-03 20:31 37K [   ] fawkes.pdf 2009-02-03 20:31 122K [   ] fox_ujf.pdf 2009-02-03 20:31 402K [   ] fse93.pdf 2009-02-03 20:31 77K [   ] fusion.pdf 2009-02-03 20:31 148K [   ] gladman.pdf 2009-02-03 20:31 45K [   ] herys.pdf 2009-02-03 20:31 10K [   ] high-perf-crypto.pdf 2009-02-03 20:31 46K [   ] histoire_cryptographie.pdf 2009-02-03 20:31 215K [   ] inc1.pdf 2009-02-03 20:31 259K [   ] inc2.pdf 2009-02-03 20:31 237K [   ] inchash.pdf 2009-02-03 20:31 427K [   ] internet-modes.pdf 2009-02-03 20:31 62K [   ] ipsec.pdf 2009-02-03 20:31 216K [   ] katmct.pdf 2009-02-03 20:31 98K [   ] key-mngmt-crypto-fs.pdf 2009-02-03 20:31 57K [   ] keyrecovery.pdf 2009-02-03 20:31 169K [   ] lars_knudsen.pdf 2009-02-03 20:31 301K [   ] lpe.pdf 2009-02-03 20:31 242K [   ] marco.pdf 2009-02-03 20:31 233K [   ] matrices.pdf 2009-02-03 20:31 121K [TXT] md5-vs-sha.txt 2009-02-03 20:31 4.8K [   ] md5_someday.pdf 2009-02-03 20:31 55K [   ] memoire-julien.pdf 2009-02-03 20:31 720K [   ] modesv2.pdf 2009-02-03 20:31 118K [   ] musee.pdf 2009-02-03 20:31 718K [   ] new_introduction_crypto.pdf 2009-02-03 20:31 278K [   ] oakland.pdf 2009-02-03 20:31 263K [   ] ocb-full.pdf 2009-02-03 20:31 659K [   ] ocf.pdf 2009-02-03 20:31 133K [   ] odyssey.pdf 2009-02-03 20:31 120K [   ] onetime.pdf 2009-02-03 20:31 50K [   ] paper716.pdf 2009-02-03 20:31 76K [   ] paper722.pdf 2009-02-03 20:31 34K [   ] paper723.pdf 2009-02-03 20:31 30K [   ] paper724.pdf 2009-02-03 20:31 85K [   ] paper726.pdf 2009-02-03 20:31 46K [   ] paper732.pdf 2009-02-03 20:31 33K [   ] paper735.pdf 2009-02-03 20:31 33K [   ] paper736.pdf 2009-02-03 20:31 38K [   ] paper737.pdf 2009-02-03 20:31 101K [   ] paper738.pdf 2009-02-03 20:31 135K [   ] paper740.pdf 2009-02-03 20:31 40K [   ] paper751.pdf 2009-02-03 20:31 33K [   ] paper764.pdf 2009-02-03 20:31 70K [   ] paper768.pdf 2009-02-03 20:31 60K [   ] paper874.pdf 2009-02-03 20:31 73K [   ] paper878.pdf 2009-02-03 20:31 271K [   ] paper879.pdf 2009-02-03 20:31 245K [   ] paper885.pdf 2009-02-03 20:31 395K [   ] paper886.pdf 2009-02-03 20:31 72K [   ] perf.pdf 2009-02-03 20:31 179K [   ] pitfalls.pdf 2009-02-03 20:31 56K [   ] preprint_frey.pdf 2009-02-03 20:31 336K [   ] qbsc_2004.pdf 2009-02-03 20:31 62K [   ] queensland.pdf 2009-02-03 20:31 202K [   ] robustness.pdf 2009-02-03 20:31 123K [   ] secret_key_cryptography.pdf 2009-02-03 20:31 1.1M [   ] shi_asap00.pdf 2009-02-03 20:31 63K [   ] skipjack-kea.pdf 2009-02-03 20:31 214K [   ] text.pdf 2009-02-03 20:31 26K [   ] thesis-ac.pdf 2009-02-03 20:31 668K [   ] thesis.pdf 2009-02-03 20:31 1.6M [   ] trapdoor.pdf 2009-02-03 20:31 41K [   ] understanding_ssl.pdf 2009-02-03 20:31 265K [   ] usenix00.pdf 2009-02-03 20:31 293K [   ] wake.pdf 2009-02-03 20:31 150K
  _________      ____    .___________      ___.   _______
 /   _____/_____/_   | __| _/\_____  \_____\_ |__ \   _  \ ___.__.
 \_____  \\____ \|   |/ __ |   _(__  <_  __ \ __ \/  /_\  <   |  |
 /        \  |_> >   / /_/ |  /       \  | \/ \_\ \  \_/   \___  |
/_______  /   __/|___\____ | /______  /__|  |___  /\_____  / ____|
        \/|__|            \/        \/          \/       \/\/

- Do you program in assembly? - NOP -- Anonymous