Files

Una piccola raccolta di files informativi di documentazione varia.
In varie pagine farò (implicitamente o esplicitamente) riferimento a files che si possono trovare in queste aree.
Viene ospitato anche un mirror di ZeroShell (sia l'ultima versione "standard" di Fulvio che la versione "di sviluppo" curata da Renato Moraro).

Display namesizeordina iconeDescrizione
Go up
TPM
eccCrittografia a curve ellittiche
identity-based
randomkey
math
NESSIE_final_report.pdf4.53 MB
Needham_-_Denial_of_service_An_example.pdf2.83 MB
cs3235-3_-_Introduction_to_computer_security.pdf2.59 MB
mars.tar.gz2.55 MB
Leighton-Micali - Secret-key agreement without public-key cryptography [UNSAFE].pdf2.32 MB
Secure group key agreement.pdf1.74 MB
TEA_Cryptanalysis_-_VRAndem.pdf1.73 MB
laws_of_cryptography_with_java_code.pdf1.08 MB
De Santis-Di Crescenzo-Persiano - Secret sharing and perfect zero knowledge.pdf983.19 KB
serpent.tar.gz956.64 KB
Information-theoretic secret key agreement.pdf925.01 KB
bellare94optimal.pdf863.36 KB
ModMult.pdf555.89 KB
Long modular multiplication for cryptographic applications.pdf555.89 KB
ping-pong.pdf517.38 KB
runwalk2.pdf483.5 KB
SP800-57-Part1.pdf475.55 KB
The random oracle methodology revisited.pdf400.01 KB
ace-iso-2.pdf382.27 KB
chan_randomkey.ps371.72 KB
dolev91nonmalleable.pdf348.19 KB
Khazad-tweak.zip317.15 KB
fips186-2-change1.pdf312.3 KB
Essential_algebraic_structure_within_the_AES.pdf303.87 KB
CBC.doc303.5 KB
Shamir_-_A_polynomial_time_algorithm_for_breaking_Merkle-Hellman_cryptosystem.PDF295.43 KB
How_to_achieve_a_McEliece-based_digital_signature_scheme.ps293.81 KB
Boyko_-_Exposure-resilient_functions_and_All-or-Nothing_transforms.ps282.92 KB
A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications.pdf276.11 KB
Cryptanalysis_of_the_Bluetooth_E0_cipher_using_OBDDs.pdf275.89 KB
pairing-based_identification_schemes.pdf263.73 KB
minrank_authentication_scheme.pdf250.94 KB
CS0946_-_Cryptanalysis_of_Skipjack-3XOR.ps242.86 KB
Maurer97.pdf230.62 KB
PARIZ_PRNG-imp-ver02.pdf213.69 KB
Iterative modular multiplication algorithm without magnitude comparison.pdf205.85 KB
Block_ciphers_and_stream_ciphers_-_The_state_of_the_art.pdf204.93 KB
cramer98practical.pdf191.93 KB
mars-attacks.pdf190.59 KB
Relatedkey_attacks_on_3way_Biham-DES_CAST_DES-X_NewDES_RC2_TEA.pdf189.76 KB
a_new_NP-complete_problem_and_PK_identification.pdf187.22 KB
md5-attack.pdf184.44 KB
DES_-_fips46-3.pdf178.92 KB
GroupKey00.ps170.52 KB
CHES_2004.pdf165.98 KB
chabaud94security.pdf165.2 KB
hall97reaction.pdf159.85 KB
Boyko_-_On_the_security_properties_of_OAEP_as_an_All-or-Nothing_transform.ps.gz149.81 KB
Rivest_-_All-or-Nothing_encryption_and_the_package_transform.pdf149.23 KB
Fast pseudo-Hadamard transforma.pdf149.08 KB
Berta_Mann_PP_2002.ps.gz136.6 KB
DES_differential_attacks.pdf125.45 KB
A new identification scheme based on syndrome decoding.pdf118.63 KB
luc_l3-1.3b.tar.gz114.25 KB
mars-HW.pdf113.1 KB
Rivest_-_All-or-Nothing_encryption_and_the_package_transform.ps106.73 KB
tiger.ps103.27 KB
tiger_-_a_fast_new_hash_function.ps103.27 KB
safer.V1.2.tar.Z97.35 KB
serpent.ps.gz89.46 KB
pkcs-3.ps82.85 KB
NESSIE_Khazad_quadratic_relations.pdf80.95 KB
luc-paper.pdf77.96 KB
gf-osr.pdf77.82 KB
a_new_family_of_authentication_protocols.pdf77.82 KB
CS0947_-_Cryptanalysis_of_Skipjack_reduced_to_31_rounds.ps.gz73.52 KB
intelRNG.pdf72.53 KB
luc-paper.ps.gz70.99 KB
NESSIE_8051cpu_results_2.pdf62.5 KB
blass-sensor-public-key-encryption-2005.pdf57.27 KB
tiger.ps.gz51.33 KB
Multiparty_unconditionally_secure_protocols.pdf38.86 KB
A_scalable_grouping_random_key_predistribution_scheme.pdf34.56 KB
pkcs-7v16.pdf26 KB
luc-0.4.cc24.28 KB
skipjack_interim_report.txt18.66 KB
despicable-1.01.tar.gz16.72 KB
tiger-src.tar.gz16.61 KB
skipjack-1.01.tar.gz15.03 KB
pkcs-7.asn9.5 KB
tea16.txt9.36 KB
tea17.txt8.61 KB
luc-in-bc.tar.gz3.18 KB
tea16.zip2.53 KB
tea17.zip2.48 KB
luc_vs_rsa.gz2.03 KB
- 6 dossiers - 86 files - 35.44 MB
Realizzato con Drupal, un sistema open source per la gestione dei contenuti