| Name |
Last modified |
Size |
|
| Parent Directory | | - |
| A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS 1 v2.0.pdf | July-11-2014 12:23 | 126 Ko |
| A Cryptographic File System for Unix.pdf | March-14-2011 17:30 | 82 Ko |
| Algo Les problemes problematiques.pdf | October-20-2010 15:00 | 59 Ko |
| Algorithmes de chiffrement par bloc.pdf | October-20-2010 15:00 | 533 Ko |
| Algorithmes de chiffrement symetrique par bloc (DES et AES).pdf | October-20-2010 15:00 | 226 Ko |
| Algorithmes et structures de donnees. Initiation au langage CamL.pdf | October-20-2010 15:00 | 260 Ko |
| Algorithmes sur les graphes.pdf | October-20-2010 15:00 | 117 Ko |
| Algorithmique.pdf | October-20-2010 15:00 | 87 Ko |
| Analyse de la complexite algorithmique.pdf | October-20-2010 15:00 | 56 Ko |
| An Analysis of LSB & DCT based Steganography.pdf | March-14-2011 17:30 | 704 Ko |
| APERIODIC POLYALPHABETIC CIPHERS.pdf | July-11-2014 12:22 | 283 Ko |
| APPENDIX FREQUENCY DISTRIBUTIONS OF ENGLISH TRIGRAPHS.pdf | March-26-2010 22:45 | 158 Ko |
| Arithmetique.pdf | July-11-2014 12:23 | 632 Ko |
| Arithmetique et cryptologie.pdf | March-27-2010 20:26 | 160 Ko |
| Attaque par factorisation contre RSA.pdf | July-11-2014 12:23 | 574 Ko |
| Basic cryptanalysis.pdf | March-27-2010 20:25 | 166 Ko |
| Basic Cryptanalysis Techniques.pdf | October-20-2010 15:00 | 670 Ko |
| Basic Encryption and Decryption.pdf | October-20-2010 15:00 | 545 Ko |
| Cartes graphiques : calcul, cryptographie et securite.pdf | October-20-2010 15:00 | 136 Ko |
| Chapitre 1 - Intro - L algorithme.pdf | October-20-2010 15:00 | 36 Ko |
| CHARACTERISTICS OF POLYGRAPHIC SUBSTITUTION SYSTEMS.pdf | July-11-2014 12:22 | 303 Ko |
| Chiffrement a clef publique, authentification et distribution des clefs.pdf | July-11-2014 12:22 | 194 Ko |
| Chiffrement AES 128ou256Bits Seagate.pdf | October-20-2010 15:00 | 265 Ko |
| Chiffrer avec RSA.pdf | July-11-2014 12:23 | 40 Ko |
| Cle Publique.pdf | July-11-2014 12:23 | 179 Ko |
| Communication Theory of Secrecy Systems.pdf | March-14-2011 17:30 | 734 Ko |
| Confidentialite et cryptographie en entreprise.pdf | July-11-2014 12:22 | 818 Ko |
| Cours individuel de cryptanalyse.pdf | October-20-2010 15:00 | 116 Ko |
| Cours Sur Les Techniques De Cryptographie - Cnam.pdf | October-20-2010 15:00 | 94 Ko |
| Cryptage et algorithmes.pdf | October-20-2010 15:00 | 399 Ko |
| Cryptanalyse de certains RSA par les fractions continues et l'algorithme LLL.pdf | May-29-2016 22:58 | 2 Mo |
| Cryptanalyse par side channel.pdf | March-26-2010 22:44 | 63 Ko |
| CRYPTANALYSIS OF A CHAOTIC IMAGE ENCRYPTION METHOD.pdf | October-20-2010 15:00 | 437 Ko |
| Cryptanalysis of MD4.pdf | March-26-2010 22:44 | 159 Ko |
| CRYPTANALYSIS SUPPORT PROGRAM.pdf | October-20-2010 15:00 | 565 Ko |
| Cryptographie.pdf | April-14-2010 02:09 | 2 Mo |
| cryptographie.pdf | October-20-2010 15:00 | 618 Ko |
| Cryptographie : de la theorie a la pratique.pdf | October-20-2010 15:00 | 2 Mo |
| CRYPTOGRAPHIE :Modes operatoires.pdf | March-14-2011 17:30 | 233 Ko |
| Cryptographie a cle publique et signature numerique Principes de fonctionnement.pdf | October-20-2010 15:00 | 233 Ko |
| Cryptographie asymetrique L exemple de RSA.pdf | March-07-2010 11:32 | 396 Ko |
| Cryptographie avec Bouncy Castle.pdf | October-20-2010 15:00 | 114 Ko |
| Cryptographie elementaire.pdf | April-15-2010 18:03 | 538 Ko |
| Cryptographie et Cryptanalyse.pdf | October-20-2010 15:00 | 750 Ko |
| Cryptographie et reverse engineering en environnement Win32.pdf | October-20-2010 15:00 | 119 Ko |
| Cryptographie evolutionniste.pdf | October-20-2010 15:00 | 37 Ko |
| Cryptographie quantique-Realisations experimentales.pdf | May-29-2016 22:58 | 11 Mo |
| Cryptographie Symetrique Asymetrique.pdf | July-11-2014 12:22 | 560 Ko |
| Cryptography engineering _ design principles and practical applications.pdf | May-29-2016 22:58 | 158 Mo |
| Crypto Key Management System (KMS)- Guide d.administration.pdf | March-14-2011 17:30 | 6 Mo |
| Cryptowall_CryptoTunnel_Client_Serveur_FR.pdf | October-20-2010 15:00 | 294 Ko |
| DATA ENCRYPTION STANDARD (DES).pdf | March-14-2011 17:30 | 179 Ko |
| Data Encryption Standard (DES).pdf | March-14-2011 17:30 | 271 Ko |
| DES.pdf | July-11-2014 12:22 | 256 Ko |
| Detection of Hiding in the Least Significant Bit.pdf | March-14-2011 17:30 | 94 Ko |
| DIGITAL COMPRESSION AND CODING OF CONTINUOUS-TONE STILL IMAGES REQUIREMENTS AND GUIDELINES.pdf | March-14-2011 17:30 | 993 Ko |
| Elements de Cryptanalyse.pdf | March-27-2010 20:27 | 64 Ko |
| EN - A crack on the glass.pdf | July-11-2014 11:59 | 1 Mo |
| EN-Attacking unbalanced RSA-CRT using SPA.pdf | October-20-2010 15:00 | 301 Ko |
| EN-Attacks on Steganographic Systems.pdf | March-14-2011 17:30 | 964 Ko |
| EN-Crypto.pdf | October-20-2010 15:00 | 191 Ko |
| EN-Crypto2.pdf | October-20-2010 15:00 | 174 Ko |
| EN-DETECTING HIDDEN MESSAGES USING HIGHER-ORDER STATISTICAL MODELS.pdf | March-14-2011 17:30 | 167 Ko |
| EN-Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines.pdf | March-14-2011 17:30 | 495 Ko |
| EN-Detecting Steganographic Content on the Internet.pdf | March-14-2011 17:30 | 821 Ko |
| EN-Detecting Steganographic Messages in Digital Images.pdf | March-14-2011 17:30 | 602 Ko |
| EN-Exploring Steganography: Seeing the Unseen.pdf | March-14-2011 17:30 | 2 Mo |
| EN-On The Limits of Steganography.pdf | March-14-2011 17:30 | 156 Ko |
| EN-Securing applications.pdf | March-14-2011 17:30 | 955 Ko |
| EN- Serpent: A Proposal for the Advanced Encryption Standard.pdf | October-20-2010 15:00 | 173 Ko |
| EN-Syndrome Decoding in the Non-Standard Cases.pdf | March-14-2011 17:30 | 237 Ko |
| EN-Weaknesses in the Key Scheduling Algorithm of RC4.pdf | October-20-2010 15:00 | 297 Ko |
| Extension et parallelisation d un algorithme de chiffrement evolutionnaire.pdf | October-20-2010 15:00 | 124 Ko |
| Fault-Based Attack of RSA Authentication.pdf | July-11-2014 12:23 | 327 Ko |
| Fonctionnement d.AES.pdf | March-14-2011 17:30 | 55 Ko |
| Fonctions de hachage.pdf | October-20-2010 15:00 | 191 Ko |
| Fournitures necessaires a l.analyse de mecanismes cryptographiques.pdf | March-14-2011 17:30 | 370 Ko |
| FOX - une nouvelle famille d algorithmes de chiffrement par bloc.pdf | October-20-2010 15:00 | 402 Ko |
| Histoire de la Cryptographie.pdf | October-20-2010 15:00 | 6 Mo |
| Histoire de la cryptologie Introduction.pdf | March-27-2010 20:27 | 215 Ko |
| HSC - Introduction a la cryptographie.pdf | March-14-2011 17:30 | 576 Ko |
| Implementation and Analysis of several Public-Key Encryption Algorithms.pdf | March-14-2011 17:30 | 214 Ko |
| Implementation d une table de hachage parallele.pdf | July-11-2014 12:23 | 344 Ko |
| Information noyee, information cachee.pdf | October-20-2010 15:00 | 199 Ko |
| Introduction a la cryptographie.pdf | March-14-2011 17:30 | 2 Mo |
| Introduction a la cryptographie quantique et au calcul quantique.pdf | May-29-2016 22:58 | 1 Mo |
| Introduction a la cryptologie et aux cryptosystemes.pdf | March-27-2010 20:26 | 64 Ko |
| Introduction aux codes secrets.pdf | October-20-2010 15:00 | 67 Ko |
| Introduction to Cryptanalyst.pdf | March-27-2010 20:25 | 24 Ko |
| Key-schedule Cryptanalysis of IDEA, G-DES,GOST, SAFER, and TRIPLE-DES.pdf | March-26-2010 22:44 | 220 Ko |
| Keyczar: A Cryptographic Toolkit.pdf | March-14-2011 17:30 | 112 Ko |
| L.application du droit de la cryptologie en matiere de securite des reseaux informatiques.pdf | October-20-2010 15:00 | 263 Ko |
| La cryptographie Militaire.pdf | October-20-2010 15:00 | 447 Ko |
| La cryptologie moderne.pdf | March-27-2010 20:27 | 205 Ko |
| La division euclidienne.pdf | July-11-2014 12:23 | 27 Ko |
| La methode RSA et la cryptographie fondee sur les courbes elliptiques.pdf | July-11-2014 12:23 | 430 Ko |
| Le chiffrement par cle publique.pdf | July-11-2014 12:23 | 295 Ko |
| Lecture Notes on Cryptography.pdf | October-20-2010 15:00 | 1 Mo |
| Le format JPEG en steganographie.pdf | March-14-2011 17:30 | 396 Ko |
| Le Polymorphisme Cryptographique.pdf | April-23-2010 00:41 | 368 Ko |
| Les algorithmes de base du graphisme.pdf | October-20-2010 15:00 | 107 Ko |
| Les risques reseaux , chiffrements , services ... .pdf | October-20-2010 15:00 | 455 Ko |
| Les_algorithmes_cryptographiques.pdf | October-20-2010 15:00 | 155 Ko |
| Linear Cryptanalysis of DES.pdf | October-20-2010 15:00 | 992 Ko |
| Longueur minimale des clefs de chiffrement symetriques afin d assurer une securite commerciale suffisante.pdf | October-20-2010 15:00 | 53 Ko |
| MD5 Collisions.pdf | March-14-2011 17:30 | 217 Ko |
| MONOALPHABETIC MULTILITERAL SUBSTITUTION SYSTEMS.pdf | July-11-2014 12:23 | 404 Ko |
| MONOALPHABETIC UNILATERAL SUBSTITUTION SYSTEMS USING MIXED CIPHER ALPHABETS.pdf | July-11-2014 12:23 | 524 Ko |
| MONOALPHABETIC UNILATERAL SUBSTITUTION SYSTEMS USING STANDARD CIPHER ALPHABETS.pdf | March-26-2010 22:46 | 136 Ko |
| OAEP Optimal Asymmetric Encryption Padding- TD - fr.pdf | July-11-2014 12:23 | 108 Ko |
| Pass The Hash.pdf | July-11-2014 12:23 | 137 Ko |
| PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS.pdf | July-11-2014 12:23 | 214 Ko |
| PKCS 1 v2.1 - RSA Cryptography Standard.pdf | July-11-2014 12:23 | 172 Ko |
| Primalite et factorisation les cles de RSA.pdf | July-11-2014 12:23 | 1 Mo |
| Principes et algo de crypto OpenSSL.pdf | October-20-2010 15:00 | 172 Ko |
| Projet de cryptographie-Cassage mot de passe Windows et Linux.pdf | October-20-2010 15:00 | 467 Ko |
| Projet Matlab : un logiciel de cryptage.pdf | March-14-2011 17:30 | 1 Mo |
| Quelques mots sur la cryptographie.pdf | March-27-2010 20:27 | 157 Ko |
| Reconstructing the Cryptanalytic Attack behind the Flame Malware.pdf | July-11-2014 12:00 | 833 Ko |
| RSA | March-29-2015 23:35 | - |
| RSA.pdf | October-20-2010 15:00 | 83 Ko |
| RSA explications.pdf | October-20-2010 15:00 | 855 Ko |
| RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.pdf | July-11-2014 12:00 | 8 Mo |
| RSA Rivest Shamir Adleman.pdf | July-11-2014 12:23 | 938 Ko |
| Secure Network Communication Public Key Cryptography.pdf | March-14-2011 17:30 | 203 Ko |
| Security Flaws Induced by CBC Padding Applications to SSL, IPSEC, WTLS....pdf | March-14-2011 17:30 | 126 Ko |
| SECURITY OF CRYPTOGRAPHIC SYSTEMS.pdf | March-26-2010 22:45 | 127 Ko |
| Signatures numeriques et preuves a divulgation nulle, cryptanalyse, defense et outils algorithmiques.pdf | March-14-2011 17:30 | 87 Ko |
| SOLUTION OF NUMERICALLY-KEYED COLUMNAR TRANSPOSITION CIPHERS.pdf | July-11-2014 12:23 | 95 Ko |
| SOLUTION OF PERIODIC POLYALPHABETIC SYSTEMS.pdf | July-11-2014 12:22 | 670 Ko |
| SOLUTION OF POLYGRAPHIC SUBSTITUTION SYSTEMS.pdf | July-11-2014 12:22 | 271 Ko |
| Steganographie : techniques.pdf | October-20-2010 15:00 | 1 Mo |
| Sur l algorithme RSA.pdf | July-11-2014 12:23 | 126 Ko |
| The Linux CryptoAPI A Users Perspective.pdf | March-27-2010 20:28 | 144 Ko |
| Theorie de l information et codage-Master de Cryptographie.pdf | October-20-2010 15:00 | 409 Ko |
| The RC5 Encryption Algorithm.pdf | October-20-2010 15:00 | 175 Ko |
| These Etudes d.outils pour la dissimulation d.information : approches fractales, protocoles d.evaluation et protocoles cryptographiques.pdf | March-14-2011 17:30 | 5 Mo |
| TRANSPOSITION SPECIAL SOLUTIONS.pdf | July-11-2014 12:23 | 75 Ko |
| TRUECRYPT FREE OPEN-SOURCE ON-THE-FLY ENCRYPTION USER.S GUIDE.pdf | October-20-2010 15:00 | 844 Ko |
| TYPES OF CODE SYSTEMS.pdf | July-11-2014 12:23 | 75 Ko |
| TYPES OF TRANSPOSITION SYSTEMS.pdf | July-11-2014 12:23 | 75 Ko |
| Une introduction a la cryptographie - asymetrique.pdf | July-11-2014 12:23 | 1 Mo |
| Unixgarden - Techniques Obfuscation De Code. Chiffrer Du Clair Avec Du Clair.pdf | October-20-2010 15:00 | 323 Ko |
| Use of the RSAES-OAEP Key Transport Algorithm in the Cryptographic Message Syntax (CMS).pdf | July-11-2014 12:23 | 22 Ko |
| vigenere.pdf | October-20-2010 15:00 | 5 Mo |
|