| Cryptography | Cryptoanalys | RSA Cryptography | Math | RSA Math | Steganography | 
This Page was made 
  by Thoroughout
surfing the Internet 
and downloading most of the PDFs
 
 and making Link Collections
    
    from 
Internet Explorer
    Favorites
[Cryptography Link Collections]
[CryptoAnalysis Link Collections]
[Cryptography & Math Link Collections]
[Math Link Collections]
[Basics_of_Cryptography.pdf]
[Introduction_to_Cryptography_Helger_Lipmaa.pdf]
[Introduction_to_cryptography_No_II.pdf]
[Lattice_Based_Cryptography.pdf]
[An_Introduction_to_Cryptography_and_Digital_Signatures.pdf]
[An_Overview_of_Cryptography.pdf]
[Cryptography_Tom_Davis.pdf]
[Essay_15_Cryptography.pdf]
[Chapter_5_Cryptography.pdf]
[Chapter_8_Cryptography.pdf]
[An_Introduction_to_Cryptography.pdf]
[An_Introduction_to_Cryptography_PGP.pdf]
[Cryptography_1990-2010_Ueli_Maurer.pdf]
[Government,_Cryptography,_and_the_Right_To_Privacy.pdf]
[Cryptography_and_Democracy_Dilemmas_of_Freedom.pdf]
[The_Laws_of_Cryptography_with_Java_Code.pdf]
[Applied_Cryptography.pdf]
[HANDBOOK_of_APPLIED_CRYPTOGRAPHY.pdf]
[Introduction_to_Cryptography_89-656.pdf]
[Cryptography_David_R_Kohel.pdf]
[Lecture_Notes_on_Cryptography.pdf]
[Notes_on_cryptography.pdf]
[Password_Based_Cryptography.pdf]
[Some_Applications_of_Coding_Theory_in_Cryptography.pdf]
[Lattice-based_Cryptography.pdf]
[A SMART-GENTRY BASED SOFTWARE SYSTEM FOR 
  SECRET PROGRAM EXECUTION.pdf]
  [A Tale of Two Open Source Cryptography Projects.pdf]
  [An Implementation of the Fully Homomorphic.pdf]
  [An Open-source Cryptographic Coprocessor.pdf]
  [An Unauthorised Guide to PGP Cryptography.pdf]
  [BitLocker To Go User Guide.pdf]
  [Can We Trust Cryptographic Software.pdf]
  [DDPE-BitLocker-Manager-Spec-Sheet.pdf]
  [How Drive Encryption Works.pdf]
  [Keyczar A Cryptographic Toolkit.pdf]
  [Open-Source Cryptographic Libraries and Embedded Platforms.pdf]
  [Password Recovery Kit Forensic 12,5.pdf]
  [PGP Software Developer’s Kit Reference Guide.pdf]
  [Practical Methods for Dealing with Full Disk Encryption.pdf]
  [Roll Your Own Crypto Services (Using Open Source and Free Cryptography).pdf]
  [Secret Program Execution in the Cloud Applying Homomorphic Encryption.pdf]
  [Secure Programming for Linux and Unix HOWTO.pdf]
  [Symmetric Cryptography in Javascript.pdf]
  [The Hidden Costs of Microsoft BitLocker.pdf]
  [Why Free Endpoint Encrypt ion Is Not Good.pdf]
  [Windows 7 BitLocker  Drive Encryption.pdf]
[A primer in Public Key cryptography, PGP and GPG.pdf]
  [Applications of Cyber Engineering GNU Privacy Guard.pdf]
  [Can We Trust Cryptographic Software Cryptographic Flaws in GNU Privacy Guard v1,2,3.pdf]
  [Chapter 2 GNU Privacy Guard.pdf]
  [EnigMai openpgp email security for mozilla applicationsl.pdf]
  [GBDE - GEOM Based Disk Encryption.pdf]
  [GNU Privacy Guard (GPG) v1,0,x Command Summary.pdf]
  [GNU Privacy Guard and Cryptography Part 2.pdf]
  [GNU Privacy Guard Howto.pdf]
  [GPG - encryption and signing.pdf]
  [Lab Project on using PGP – GNU Privacy Guard (GPG) for Secure E-mai.pdf]
  [Laboratory assignment 1 Gnu Privacy Guard (GPG).pdf]
  [MOVEit CENTRAL OpenPGP option.pdf]
  [The Libgcrypt Reference Manual.pdf]
  [Using GNU Privacy Guard.pdf]
  [Using the GNU Privacy Guard 2.pdf]
[A Public Key Cryptosystem and a Signature Scheme Based
on Discrete Logarithms.pdf]
[An implementation of RSA and ElGamal PKCs using Java BigInteger class.pdf]
[Distributed Blinding for Distributed ElGamal Re-encryption.pdf]
[ElGamal cryptosystem.pdf]
[Implementing several attacks on plain ElGamal encryption (2).pdf]
[Implementing several attacks on plain ElGamal encryption.pdf]
[Meier Andreas The ElGamal Cryptosystem.pdf]
[On the Security of ElGamal Based Encryption.pdf]
[Security of Signed ElGamal Encryption.pdf]
[A Model of Unforgeable Digital Certificate Document System.pdf]
  [A New Approach to PGP’s Web of Trust.pdf]
  [A New Approach to PGP’sWeb of Trust.pdf]
  [An Algebra for Assessing Trust in Certification Chains.pdf]
  [Building a Web of Trust.pdf]
  [FEDERAL PLAN for CYBER SECURITY AND INFORMATION
ASSURANCE RESEARCH AND DEVELOPMENT.pdf]
  [Getting started in the Web of Trust.pdf]
  [Global Information Assurance Certification Paper.pdf]
  [IBM WebSphere Partner Gateway V6,2,1 Advanced
and Enterprise Editions OpenPGP.pdf]
  [KeyChains A Decentralized Public-Key Infrastructure.pdf]
  [Macro- and Micro-structure of Trust Networks.pdf]
  [Merging and Extending the PGP and PEM Trust Models 
  - The ICE-TEL Trust Mod.pdf]
  [Overview of Certification Systems X,509, CA, PGP and SKIP.pdf]
  [PGP Key Management.pdf]
  [Public Key Infrastructures - PGP vs, X,509.pdf]
  [Resilience of the PGP “web of trust” and the disruption of criminal networks.pdf]
  [This is a Chapter from the Handbook of Applied Cryptography.pdf]
  [TRUST FORMATION BASED ON SUBJECTIVE LOGIC AND PGP WEB-OF
  -TRUST FOR INFORMATION SHARING IN MOBILE AD-HOC NETWORK.pdf]
  [Using PGP to Verify Digital Signatures.pdf]
[Public-Key_Cryptography_Theory_and_Practice.pdf]
[Hardware_Architectures_for_Public_Key_Cryptography.pdf]
[Certificateless_Public_Key_Cryptography.pdf]
[FEDERAL_INFORMATION_PROCESSING_STANDARDS
_PUBLICATION_ENTITY_AUTHENTICATION
USING_PUBLIC_KEY_CRYPTOGRAPHY.pdf]
[A_tutorial_of_elliptic_curve_cryptography.pdf]
[AUTOIDLABS_Elliptic_Curve_Cryptography.pdf]
[Elliptic_Curve Cryptography_Good_Enough_for_Government_Work.pdf]
[Elliptic_Curve_Cryptography_Ning_Shang.pdf]
[Elliptic_Curve_Cryptosystem_and_its_Applications.pdf]
[Guide_to_Elliptic_Curve_Cryptography.pdf]
[Introduction_to_Elliptic_Curve_Cryptography.pdf]
[Simple_Tutorial_on_Elliptic_Curve_Cryptography.pdf]
[STANDARDS_FOR_EFFICIENT_CRYPTOGRAPHY_Elliptic_Curve_Cryptography.pdf]
[STANDARDS_FOR_EFFICIENT_CRYPTOGRAPHY_Elliptic_Curve_Cryptography.pdf]
[A Quick Glance at Quantum Cryptography.pdf]
[The_Future_of_Cryptography_Under_Quantum_Computers.pdf]
[Quantum_Cryptography_in_Practice.pdf]
[Analysis of the SSL 3,0 protocol.pdf]
  [Directions for Enabling TLS 1.0 for Internet Explorer, Firefox, Safari, and Chrome.pdf]
  [Enabling TLS 1,0 for Online Payment.pdf]
  [How to Enable TLS 1.0 in Internet Explorer, FIREFOX & SAFARI.pdf]
  [MS-TLSP - Transport Layer Security (TLS) Profile.pdf]
  [Notes on Transport Layer Security.pdf]
  [OpenSSL Security Policy.pdf]
  [OpenSSL User Guide.pdf]
  [Standard Group MAC Addresses A Tutorial Guide.pdf] 
  [The Most Dangerous Code in the World  -  Validating SSL
Certificates in Non-Browser Software.pdf] 
[Filöverforing med SFTP.pdf]
  [How to Set Up an FTPES Connection.pdf]
[Implementation Guidance for FIPS PUB 140-2
 and the Cryptographic Module Validation Program.pdf]
  [Name-based SSL virtual hosts  -  how to tackle the problem.pdf]
  [New Tricks For Defeating SSL In Practice.pdf]
  [Secure Socket Layer (SSL) and Transport Layer Security (TLS).pdf]
  [TLS Renegotiation Vulnerability.pdf]
  [Transport Layer Security (TLS) About TLS.pdf]
  [Understanding SSL and TLS.pdf]
  [A Novel Secure.pdf]
  [cast_sha256-a.pdf]
  [ch12.pdf]
  [Draft-FIPS180-4_Feb2011.pdf]
  [Finding Collisions in the Full SHA-1.pdf]
  [H0664951.pdf]
  [hash.pdf]
  [l_11chf.pdf]
  [Lecture15.pdf]
  [March2009_cryptographic-hash-algorithm-family.pdf]
  [Secure_Hash_Algorithm.pdf]
  [SHA_All.pdf]
  [SHA_interface.pdf]
  [SHA-1_Deprecated.pdf]
  [sha2.pdf]
  [SHA256.pdf]
  [SHA512.pdf]
  [SHA512_224.pdf]
  [SHAVS.pdf]
[(Non-)Random Sequences from (Non-)Random Permutations
 - Analysis of RC4 stream cipher.pdf]
     [(Not So) Random Shufles of RC4.pdf]
     [A New Variant of RC4 Stream Cipher.pdf]
     [A New Weakness in the RC4 Keystream Generator and 
     an Approach to Improve the Security of the Cipher.pdf]
     [A Pragmatic Study on Different Stream Ciphers
 And On Different Flavors of RC4 Stream Cipher.pdf]
     [An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks.pdf]
     [AN RC4 BASED LIGHT WEIGHT SECURE PROTOCOL FOR SENSOR NETWORKS.pdf]
     [Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANs.pdf]
     [Cryptanalysis of RC4-like Ciphers.pdf]
     [Design and Analysis of RC4-like Stream Ciphers.pdf]
     [Design and Simulation of Enhancing
 RC4 Stream Cipher for Wi-Fi Security using Verilog HDL.pdf]
     [Energy, performance, area versus security trade-offs for stream ciphers.pdf]
     [Finding an internal state of RC4 stream cipher.pdf]
     [Four Lines of Design to Forty Papers of Analysis  -  The RC4 Stream Cipher.pdf]
     [Full Plaintext Recovery Attack on Broadcast RC4.pdf]
     [Hardware Implementation of Modified RC4 Stream Cipher Using FPGA.pdf]
     [Internal-State Reconstruction of a Stream Cipher RC4.pdf]
     [Introduction to Modern Cryptography  -  Stream Ciphers.pdf]
     [Key Collisions of the RC4 Stream Cipher.pdf]
     [Linear Statistical Weakness of Alleged RC4 Keystream Generator.pdf]
     [PC1-RC4 and PC2-RC4 Algorithms Pragmatic Enrichment
Algorithms to Enhance RC4 Stream Cipher Algorithm.pdf]
     [RC4 stream cipher and possible attacks on WEP.pdf]
     [Reducing the State Space of RC4 Stream Cipher.pdf]
     [Some Thoughts about Implementation Properties of Stream Ciphers.pdf]
     [SPECIALIZED COPROCESSOR FOR IMPLEMEBNTING THE RC4 STREAM CIPHER.pdf]
     [Statistical Analysis of the Alleged RC4 Keystream Generator.pdf]
     [The Most Efficient Distinguishing Attack on VMPC and RC4A.pdf]
     [Towards a General RC4-like Keystream Generator.pdf]
     [Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers.pdf]
     [Weaknesses in the Key Scheduling Algorithm of RC4.pdf]
     [VMPC One-Way Function and Stream Cipher.pdf]
     [(Not So) Random Shufles of RC4.pdf]
     [A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher.pdf]
     [Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator.pdf]
     [Analysis of RC4 and Proposal of Additional Layers for Better Security Margin.pdf]
     [Breaking 104 bit WEP in less than 60 seconds.pdf]
     [On the Design and Security of RC2.pdf]
     [Statistical Analysis of the Alleged RC4 Keystream Generator.pdf]
     [The Most Efficient Distinguishing Attack on VMPC and RC4A.pdf]
     [Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers.pdf]
     [VMPC One-Way Function and Stream Cipher.pdf]
[Attack on Broadcast RC4 Revisited .pdf]
    [Different attacks on the RC4 stream cipher.pdf]
    [Introduction to Cryptography  -  The RC4 Stream Cipher.pdf]
    [Key Collisions of the RC4 Stream Cipher.pdf]
    [Near-colliding Keys in RC4.pdf]
    [RC4 (2).pdf]
    [Simplified RC4 Example.pdf]
    [Stream Ciphers - RC4.pdf]
    [The ISAAC Stream Cipher.pdf]
    [THE RC4 STREAM ENCRYPTION ALGORITHM.pdf]
    [Today.pdf]
[A Hardware implementation of Winograd Fourier Transform algorithm for Cryptography.pdf]
[Bridging_Game_Theory_and_Cryptography_Recent_Results_and_Future_Directions.pdf]
[Cryptography_As_An_Operating_System_Service_A_Case_Study.pdf]
[Cryptography_from_Anonymity.pdf]
[Cryptography_in_Theory_and_Practice_The_Case_of_Encryption_in_IPsec.pdf]
[CryptoLib Cryptography in Software.pdf]
[DESIGN_OF_A_NEW_SECURITY
_PROTOCOL_USING_HYBRID_CRYPTOGRAPHY_ALGORITHMS.pdf]
[Leakage-Resilient_Cryptography.pdf]
[New_Directions_in_Cryptography.pdf]
[Proxy_Cryptography_Revisited.pdf]
[Reconciling_Two_Views_of_Cryptography.pdf]
[Cryptography_and_Evidence.pdf]
[Case_Studies_in_Symmetric_Key_Cryptography.pdf]
[Computational_Complexity_A_Modern_Approach.pdf]
[Cryptography-Business_Value_Behind_the_Myth.pdf]
[Group-based_cryptography.pdf]
[Hierarchical_ID-Based_Cryptography.pdf]
| Cryptography | Cryptoanalys | RSA Cryptography | Math | RSA Math | Steganography |