Files

Una piccola raccolta di files informativi di documentazione varia.
In varie pagine farò (implicitamente o esplicitamente) riferimento a files che si possono trovare in queste aree.
Viene ospitato anche un mirror di ZeroShell (sia l'ultima versione "standard" di Fulvio che la versione "di sviluppo" curata da Renato Moraro).

Display namesizeDescrizioneordina icone
eccCrittografia a curve ellittiche
randomkey
math
identity-based
Go up
TPM
luc-paper.pdf77.96 KB
luc-in-bc.tar.gz3.18 KB
luc-0.4.cc24.28 KB
laws_of_cryptography_with_java_code.pdf1.08 MB
luc-paper.ps.gz70.99 KB
luc_l3-1.3b.tar.gz114.25 KB
mars-attacks.pdf190.59 KB
mars-HW.pdf113.1 KB
luc_vs_rsa.gz2.03 KB
intelRNG.pdf72.53 KB
hall97reaction.pdf159.85 KB
cramer98practical.pdf191.93 KB
chan_randomkey.ps371.72 KB
chabaud94security.pdf165.2 KB
blass-sensor-public-key-encryption-2005.pdf57.27 KB
cs3235-3_-_Introduction_to_computer_security.pdf2.59 MB
despicable-1.01.tar.gz16.72 KB
gf-osr.pdf77.82 KB
fips186-2-change1.pdf312.3 KB
dolev91nonmalleable.pdf348.19 KB
mars.tar.gz2.55 MB
md5-attack.pdf184.44 KB
tea17.txt8.61 KB
tea16.zip2.53 KB
tea16.txt9.36 KB
skipjack_interim_report.txt18.66 KB
tea17.zip2.48 KB
tiger-src.tar.gz16.61 KB
tiger_-_a_fast_new_hash_function.ps103.27 KB
tiger.ps.gz51.33 KB
tiger.ps103.27 KB
skipjack-1.01.tar.gz15.03 KB
serpent.tar.gz956.64 KB
pkcs-3.ps82.85 KB
ping-pong.pdf517.38 KB
pairing-based_identification_schemes.pdf263.73 KB
minrank_authentication_scheme.pdf250.94 KB
pkcs-7.asn9.5 KB
pkcs-7v16.pdf26 KB
serpent.ps.gz89.46 KB
safer.V1.2.tar.Z97.35 KB
runwalk2.pdf483.5 KB
bellare94optimal.pdf863.36 KB
ace-iso-2.pdf382.27 KB
De Santis-Di Crescenzo-Persiano - Secret sharing and perfect zero knowledge.pdf983.19 KB
Essential_algebraic_structure_within_the_AES.pdf303.87 KB
Cryptanalysis_of_the_Bluetooth_E0_cipher_using_OBDDs.pdf275.89 KB
DES_-_fips46-3.pdf178.92 KB
Fast pseudo-Hadamard transforma.pdf149.08 KB
GroupKey00.ps170.52 KB
Iterative modular multiplication algorithm without magnitude comparison.pdf205.85 KB
Information-theoretic secret key agreement.pdf925.01 KB
How_to_achieve_a_McEliece-based_digital_signature_scheme.ps293.81 KB
CS0946_-_Cryptanalysis_of_Skipjack-3XOR.ps242.86 KB
CS0947_-_Cryptanalysis_of_Skipjack_reduced_to_31_rounds.ps.gz73.52 KB
Berta_Mann_PP_2002.ps.gz136.6 KB
A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications.pdf276.11 KB
A_scalable_grouping_random_key_predistribution_scheme.pdf34.56 KB
A new identification scheme based on syndrome decoding.pdf118.63 KB
Block_ciphers_and_stream_ciphers_-_The_state_of_the_art.pdf204.93 KB
Boyko_-_Exposure-resilient_functions_and_All-or-Nothing_transforms.ps282.92 KB
CHES_2004.pdf165.98 KB
CBC.doc303.5 KB
DES_differential_attacks.pdf125.45 KB
Khazad-tweak.zip317.15 KB
Leighton-Micali - Secret-key agreement without public-key cryptography [UNSAFE].pdf2.32 MB
Secure group key agreement.pdf1.74 MB
SP800-57-Part1.pdf475.55 KB
Rivest_-_All-or-Nothing_encryption_and_the_package_transform.ps106.73 KB
Rivest_-_All-or-Nothing_encryption_and_the_package_transform.pdf149.23 KB
Shamir_-_A_polynomial_time_algorithm_for_breaking_Merkle-Hellman_cryptosystem.PDF295.43 KB
TEA_Cryptanalysis_-_VRAndem.pdf1.73 MB
a_new_family_of_authentication_protocols.pdf77.82 KB
a_new_NP-complete_problem_and_PK_identification.pdf187.22 KB
The random oracle methodology revisited.pdf400.01 KB
Relatedkey_attacks_on_3way_Biham-DES_CAST_DES-X_NewDES_RC2_TEA.pdf189.76 KB
PARIZ_PRNG-imp-ver02.pdf213.69 KB
ModMult.pdf555.89 KB
Maurer97.pdf230.62 KB
Long modular multiplication for cryptographic applications.pdf555.89 KB
Multiparty_unconditionally_secure_protocols.pdf38.86 KB
NESSIE_8051cpu_results_2.pdf62.5 KB
Needham_-_Denial_of_service_An_example.pdf2.83 MB
NESSIE_final_report.pdf4.53 MB
NESSIE_Khazad_quadratic_relations.pdf80.95 KB
Boyko_-_On_the_security_properties_of_OAEP_as_an_All-or-Nothing_transform.ps.gz149.81 KB
- 6 dossiers - 86 files - 35.44 MB
Realizzato con Drupal, un sistema open source per la gestione dei contenuti