Cryptography | Cryptoanalys | RSA Cryptography | Math | RSA Math | Steganography |
This Page was made
by Thoroughout
surfing the Internet
and downloading most of the PDFs
and making Link Collections
from
Internet Explorer
Favorites
[Cryptography Link Collections]
[CryptoAnalysis Link Collections]
[Cryptography & Math Link Collections]
[Math Link Collections]
[Basics_of_Cryptography.pdf]
[Introduction_to_Cryptography_Helger_Lipmaa.pdf]
[Introduction_to_cryptography_No_II.pdf]
[Lattice_Based_Cryptography.pdf]
[An_Introduction_to_Cryptography_and_Digital_Signatures.pdf]
[An_Overview_of_Cryptography.pdf]
[Cryptography_Tom_Davis.pdf]
[Essay_15_Cryptography.pdf]
[Chapter_5_Cryptography.pdf]
[Chapter_8_Cryptography.pdf]
[An_Introduction_to_Cryptography.pdf]
[An_Introduction_to_Cryptography_PGP.pdf]
[Cryptography_1990-2010_Ueli_Maurer.pdf]
[Government,_Cryptography,_and_the_Right_To_Privacy.pdf]
[Cryptography_and_Democracy_Dilemmas_of_Freedom.pdf]
[The_Laws_of_Cryptography_with_Java_Code.pdf]
[Applied_Cryptography.pdf]
[HANDBOOK_of_APPLIED_CRYPTOGRAPHY.pdf]
[Introduction_to_Cryptography_89-656.pdf]
[Cryptography_David_R_Kohel.pdf]
[Lecture_Notes_on_Cryptography.pdf]
[Notes_on_cryptography.pdf]
[Password_Based_Cryptography.pdf]
[Some_Applications_of_Coding_Theory_in_Cryptography.pdf]
[Lattice-based_Cryptography.pdf]
[A SMART-GENTRY BASED SOFTWARE SYSTEM FOR
SECRET PROGRAM EXECUTION.pdf]
[A Tale of Two Open Source Cryptography Projects.pdf]
[An Implementation of the Fully Homomorphic.pdf]
[An Open-source Cryptographic Coprocessor.pdf]
[An Unauthorised Guide to PGP Cryptography.pdf]
[BitLocker To Go User Guide.pdf]
[Can We Trust Cryptographic Software.pdf]
[DDPE-BitLocker-Manager-Spec-Sheet.pdf]
[How Drive Encryption Works.pdf]
[Keyczar A Cryptographic Toolkit.pdf]
[Open-Source Cryptographic Libraries and Embedded Platforms.pdf]
[Password Recovery Kit Forensic 12,5.pdf]
[PGP Software Developer’s Kit Reference Guide.pdf]
[Practical Methods for Dealing with Full Disk Encryption.pdf]
[Roll Your Own Crypto Services (Using Open Source and Free Cryptography).pdf]
[Secret Program Execution in the Cloud Applying Homomorphic Encryption.pdf]
[Secure Programming for Linux and Unix HOWTO.pdf]
[Symmetric Cryptography in Javascript.pdf]
[The Hidden Costs of Microsoft BitLocker.pdf]
[Why Free Endpoint Encrypt ion Is Not Good.pdf]
[Windows 7 BitLocker Drive Encryption.pdf]
[A primer in Public Key cryptography, PGP and GPG.pdf]
[Applications of Cyber Engineering GNU Privacy Guard.pdf]
[Can We Trust Cryptographic Software Cryptographic Flaws in GNU Privacy Guard v1,2,3.pdf]
[Chapter 2 GNU Privacy Guard.pdf]
[EnigMai openpgp email security for mozilla applicationsl.pdf]
[GBDE - GEOM Based Disk Encryption.pdf]
[GNU Privacy Guard (GPG) v1,0,x Command Summary.pdf]
[GNU Privacy Guard and Cryptography Part 2.pdf]
[GNU Privacy Guard Howto.pdf]
[GPG - encryption and signing.pdf]
[Lab Project on using PGP – GNU Privacy Guard (GPG) for Secure E-mai.pdf]
[Laboratory assignment 1 Gnu Privacy Guard (GPG).pdf]
[MOVEit CENTRAL OpenPGP option.pdf]
[The Libgcrypt Reference Manual.pdf]
[Using GNU Privacy Guard.pdf]
[Using the GNU Privacy Guard 2.pdf]
[A Public Key Cryptosystem and a Signature Scheme Based
on Discrete Logarithms.pdf]
[An implementation of RSA and ElGamal PKCs using Java BigInteger class.pdf]
[Distributed Blinding for Distributed ElGamal Re-encryption.pdf]
[ElGamal cryptosystem.pdf]
[Implementing several attacks on plain ElGamal encryption (2).pdf]
[Implementing several attacks on plain ElGamal encryption.pdf]
[Meier Andreas The ElGamal Cryptosystem.pdf]
[On the Security of ElGamal Based Encryption.pdf]
[Security of Signed ElGamal Encryption.pdf]
[A Model of Unforgeable Digital Certificate Document System.pdf]
[A New Approach to PGP’s Web of Trust.pdf]
[A New Approach to PGP’sWeb of Trust.pdf]
[An Algebra for Assessing Trust in Certification Chains.pdf]
[Building a Web of Trust.pdf]
[FEDERAL PLAN for CYBER SECURITY AND INFORMATION
ASSURANCE RESEARCH AND DEVELOPMENT.pdf]
[Getting started in the Web of Trust.pdf]
[Global Information Assurance Certification Paper.pdf]
[IBM WebSphere Partner Gateway V6,2,1 Advanced
and Enterprise Editions OpenPGP.pdf]
[KeyChains A Decentralized Public-Key Infrastructure.pdf]
[Macro- and Micro-structure of Trust Networks.pdf]
[Merging and Extending the PGP and PEM Trust Models
- The ICE-TEL Trust Mod.pdf]
[Overview of Certification Systems X,509, CA, PGP and SKIP.pdf]
[PGP Key Management.pdf]
[Public Key Infrastructures - PGP vs, X,509.pdf]
[Resilience of the PGP “web of trust” and the disruption of criminal networks.pdf]
[This is a Chapter from the Handbook of Applied Cryptography.pdf]
[TRUST FORMATION BASED ON SUBJECTIVE LOGIC AND PGP WEB-OF
-TRUST FOR INFORMATION SHARING IN MOBILE AD-HOC NETWORK.pdf]
[Using PGP to Verify Digital Signatures.pdf]
[Public-Key_Cryptography_Theory_and_Practice.pdf]
[Hardware_Architectures_for_Public_Key_Cryptography.pdf]
[Certificateless_Public_Key_Cryptography.pdf]
[FEDERAL_INFORMATION_PROCESSING_STANDARDS
_PUBLICATION_ENTITY_AUTHENTICATION
USING_PUBLIC_KEY_CRYPTOGRAPHY.pdf]
[A_tutorial_of_elliptic_curve_cryptography.pdf]
[AUTOIDLABS_Elliptic_Curve_Cryptography.pdf]
[Elliptic_Curve Cryptography_Good_Enough_for_Government_Work.pdf]
[Elliptic_Curve_Cryptography_Ning_Shang.pdf]
[Elliptic_Curve_Cryptosystem_and_its_Applications.pdf]
[Guide_to_Elliptic_Curve_Cryptography.pdf]
[Introduction_to_Elliptic_Curve_Cryptography.pdf]
[Simple_Tutorial_on_Elliptic_Curve_Cryptography.pdf]
[STANDARDS_FOR_EFFICIENT_CRYPTOGRAPHY_Elliptic_Curve_Cryptography.pdf]
[STANDARDS_FOR_EFFICIENT_CRYPTOGRAPHY_Elliptic_Curve_Cryptography.pdf]
[A Quick Glance at Quantum Cryptography.pdf]
[The_Future_of_Cryptography_Under_Quantum_Computers.pdf]
[Quantum_Cryptography_in_Practice.pdf]
[Analysis of the SSL 3,0 protocol.pdf]
[Directions for Enabling TLS 1.0 for Internet Explorer, Firefox, Safari, and Chrome.pdf]
[Enabling TLS 1,0 for Online Payment.pdf]
[How to Enable TLS 1.0 in Internet Explorer, FIREFOX & SAFARI.pdf]
[MS-TLSP - Transport Layer Security (TLS) Profile.pdf]
[Notes on Transport Layer Security.pdf]
[OpenSSL Security Policy.pdf]
[OpenSSL User Guide.pdf]
[Standard Group MAC Addresses A Tutorial Guide.pdf]
[The Most Dangerous Code in the World - Validating SSL
Certificates in Non-Browser Software.pdf]
[Filöverforing med SFTP.pdf]
[How to Set Up an FTPES Connection.pdf]
[Implementation Guidance for FIPS PUB 140-2
and the Cryptographic Module Validation Program.pdf]
[Name-based SSL virtual hosts - how to tackle the problem.pdf]
[New Tricks For Defeating SSL In Practice.pdf]
[Secure Socket Layer (SSL) and Transport Layer Security (TLS).pdf]
[TLS Renegotiation Vulnerability.pdf]
[Transport Layer Security (TLS) About TLS.pdf]
[Understanding SSL and TLS.pdf]
[A Novel Secure.pdf]
[cast_sha256-a.pdf]
[ch12.pdf]
[Draft-FIPS180-4_Feb2011.pdf]
[Finding Collisions in the Full SHA-1.pdf]
[H0664951.pdf]
[hash.pdf]
[l_11chf.pdf]
[Lecture15.pdf]
[March2009_cryptographic-hash-algorithm-family.pdf]
[Secure_Hash_Algorithm.pdf]
[SHA_All.pdf]
[SHA_interface.pdf]
[SHA-1_Deprecated.pdf]
[sha2.pdf]
[SHA256.pdf]
[SHA512.pdf]
[SHA512_224.pdf]
[SHAVS.pdf]
[(Non-)Random Sequences from (Non-)Random Permutations
- Analysis of RC4 stream cipher.pdf]
[(Not So) Random Shufles of RC4.pdf]
[A New Variant of RC4 Stream Cipher.pdf]
[A New Weakness in the RC4 Keystream Generator and
an Approach to Improve the Security of the Cipher.pdf]
[A Pragmatic Study on Different Stream Ciphers
And On Different Flavors of RC4 Stream Cipher.pdf]
[An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks.pdf]
[AN RC4 BASED LIGHT WEIGHT SECURE PROTOCOL FOR SENSOR NETWORKS.pdf]
[Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANs.pdf]
[Cryptanalysis of RC4-like Ciphers.pdf]
[Design and Analysis of RC4-like Stream Ciphers.pdf]
[Design and Simulation of Enhancing
RC4 Stream Cipher for Wi-Fi Security using Verilog HDL.pdf]
[Energy, performance, area versus security trade-offs for stream ciphers.pdf]
[Finding an internal state of RC4 stream cipher.pdf]
[Four Lines of Design to Forty Papers of Analysis - The RC4 Stream Cipher.pdf]
[Full Plaintext Recovery Attack on Broadcast RC4.pdf]
[Hardware Implementation of Modified RC4 Stream Cipher Using FPGA.pdf]
[Internal-State Reconstruction of a Stream Cipher RC4.pdf]
[Introduction to Modern Cryptography - Stream Ciphers.pdf]
[Key Collisions of the RC4 Stream Cipher.pdf]
[Linear Statistical Weakness of Alleged RC4 Keystream Generator.pdf]
[PC1-RC4 and PC2-RC4 Algorithms Pragmatic Enrichment
Algorithms to Enhance RC4 Stream Cipher Algorithm.pdf]
[RC4 stream cipher and possible attacks on WEP.pdf]
[Reducing the State Space of RC4 Stream Cipher.pdf]
[Some Thoughts about Implementation Properties of Stream Ciphers.pdf]
[SPECIALIZED COPROCESSOR FOR IMPLEMEBNTING THE RC4 STREAM CIPHER.pdf]
[Statistical Analysis of the Alleged RC4 Keystream Generator.pdf]
[The Most Efficient Distinguishing Attack on VMPC and RC4A.pdf]
[Towards a General RC4-like Keystream Generator.pdf]
[Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers.pdf]
[Weaknesses in the Key Scheduling Algorithm of RC4.pdf]
[VMPC One-Way Function and Stream Cipher.pdf]
[(Not So) Random Shufles of RC4.pdf]
[A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher.pdf]
[Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator.pdf]
[Analysis of RC4 and Proposal of Additional Layers for Better Security Margin.pdf]
[Breaking 104 bit WEP in less than 60 seconds.pdf]
[On the Design and Security of RC2.pdf]
[Statistical Analysis of the Alleged RC4 Keystream Generator.pdf]
[The Most Efficient Distinguishing Attack on VMPC and RC4A.pdf]
[Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers.pdf]
[VMPC One-Way Function and Stream Cipher.pdf]
[Attack on Broadcast RC4 Revisited .pdf]
[Different attacks on the RC4 stream cipher.pdf]
[Introduction to Cryptography - The RC4 Stream Cipher.pdf]
[Key Collisions of the RC4 Stream Cipher.pdf]
[Near-colliding Keys in RC4.pdf]
[RC4 (2).pdf]
[Simplified RC4 Example.pdf]
[Stream Ciphers - RC4.pdf]
[The ISAAC Stream Cipher.pdf]
[THE RC4 STREAM ENCRYPTION ALGORITHM.pdf]
[Today.pdf]
[A Hardware implementation of Winograd Fourier Transform algorithm for Cryptography.pdf]
[Bridging_Game_Theory_and_Cryptography_Recent_Results_and_Future_Directions.pdf]
[Cryptography_As_An_Operating_System_Service_A_Case_Study.pdf]
[Cryptography_from_Anonymity.pdf]
[Cryptography_in_Theory_and_Practice_The_Case_of_Encryption_in_IPsec.pdf]
[CryptoLib Cryptography in Software.pdf]
[DESIGN_OF_A_NEW_SECURITY
_PROTOCOL_USING_HYBRID_CRYPTOGRAPHY_ALGORITHMS.pdf]
[Leakage-Resilient_Cryptography.pdf]
[New_Directions_in_Cryptography.pdf]
[Proxy_Cryptography_Revisited.pdf]
[Reconciling_Two_Views_of_Cryptography.pdf]
[Cryptography_and_Evidence.pdf]
[Case_Studies_in_Symmetric_Key_Cryptography.pdf]
[Computational_Complexity_A_Modern_Approach.pdf]
[Cryptography-Business_Value_Behind_the_Myth.pdf]
[Group-based_cryptography.pdf]
[Hierarchical_ID-Based_Cryptography.pdf]
Cryptography | Cryptoanalys | RSA Cryptography | Math | RSA Math | Steganography |