Files

Una piccola raccolta di files informativi di documentazione varia.
In varie pagine farò (implicitamente o esplicitamente) riferimento a files che si possono trovare in queste aree.
Viene ospitato anche un mirror di ZeroShell (sia l'ultima versione "standard" di Fulvio che la versione "di sviluppo" curata da Renato Moraro).

Display nameordina iconesizeDescrizione
TPM
randomkey
math
identity-based
eccCrittografia a curve ellittiche
Go up
tiger_-_a_fast_new_hash_function.ps103.27 KB
tiger.ps.gz51.33 KB
tiger.ps103.27 KB
tiger-src.tar.gz16.61 KB
The random oracle methodology revisited.pdf400.01 KB
TEA_Cryptanalysis_-_VRAndem.pdf1.73 MB
tea17.zip2.48 KB
tea17.txt8.61 KB
tea16.zip2.53 KB
tea16.txt9.36 KB
SP800-57-Part1.pdf475.55 KB
skipjack_interim_report.txt18.66 KB
skipjack-1.01.tar.gz15.03 KB
Shamir_-_A_polynomial_time_algorithm_for_breaking_Merkle-Hellman_cryptosystem.PDF295.43 KB
serpent.tar.gz956.64 KB
serpent.ps.gz89.46 KB
Secure group key agreement.pdf1.74 MB
safer.V1.2.tar.Z97.35 KB
runwalk2.pdf483.5 KB
Rivest_-_All-or-Nothing_encryption_and_the_package_transform.ps106.73 KB
Rivest_-_All-or-Nothing_encryption_and_the_package_transform.pdf149.23 KB
Relatedkey_attacks_on_3way_Biham-DES_CAST_DES-X_NewDES_RC2_TEA.pdf189.76 KB
pkcs-7v16.pdf26 KB
pkcs-7.asn9.5 KB
pkcs-3.ps82.85 KB
ping-pong.pdf517.38 KB
PARIZ_PRNG-imp-ver02.pdf213.69 KB
pairing-based_identification_schemes.pdf263.73 KB
NESSIE_Khazad_quadratic_relations.pdf80.95 KB
NESSIE_final_report.pdf4.53 MB
NESSIE_8051cpu_results_2.pdf62.5 KB
Needham_-_Denial_of_service_An_example.pdf2.83 MB
Multiparty_unconditionally_secure_protocols.pdf38.86 KB
ModMult.pdf555.89 KB
minrank_authentication_scheme.pdf250.94 KB
md5-attack.pdf184.44 KB
Maurer97.pdf230.62 KB
mars.tar.gz2.55 MB
mars-HW.pdf113.1 KB
mars-attacks.pdf190.59 KB
luc_vs_rsa.gz2.03 KB
luc_l3-1.3b.tar.gz114.25 KB
luc-paper.ps.gz70.99 KB
luc-paper.pdf77.96 KB
luc-in-bc.tar.gz3.18 KB
luc-0.4.cc24.28 KB
Long modular multiplication for cryptographic applications.pdf555.89 KB
Leighton-Micali - Secret-key agreement without public-key cryptography [UNSAFE].pdf2.32 MB
laws_of_cryptography_with_java_code.pdf1.08 MB
Khazad-tweak.zip317.15 KB
Iterative modular multiplication algorithm without magnitude comparison.pdf205.85 KB
intelRNG.pdf72.53 KB
Information-theoretic secret key agreement.pdf925.01 KB
How_to_achieve_a_McEliece-based_digital_signature_scheme.ps293.81 KB
hall97reaction.pdf159.85 KB
GroupKey00.ps170.52 KB
gf-osr.pdf77.82 KB
fips186-2-change1.pdf312.3 KB
Fast pseudo-Hadamard transforma.pdf149.08 KB
Essential_algebraic_structure_within_the_AES.pdf303.87 KB
dolev91nonmalleable.pdf348.19 KB
despicable-1.01.tar.gz16.72 KB
DES_differential_attacks.pdf125.45 KB
DES_-_fips46-3.pdf178.92 KB
De Santis-Di Crescenzo-Persiano - Secret sharing and perfect zero knowledge.pdf983.19 KB
cs3235-3_-_Introduction_to_computer_security.pdf2.59 MB
CS0947_-_Cryptanalysis_of_Skipjack_reduced_to_31_rounds.ps.gz73.52 KB
CS0946_-_Cryptanalysis_of_Skipjack-3XOR.ps242.86 KB
Cryptanalysis_of_the_Bluetooth_E0_cipher_using_OBDDs.pdf275.89 KB
cramer98practical.pdf191.93 KB
CHES_2004.pdf165.98 KB
chan_randomkey.ps371.72 KB
chabaud94security.pdf165.2 KB
CBC.doc303.5 KB
Boyko_-_On_the_security_properties_of_OAEP_as_an_All-or-Nothing_transform.ps.gz149.81 KB
Boyko_-_Exposure-resilient_functions_and_All-or-Nothing_transforms.ps282.92 KB
Block_ciphers_and_stream_ciphers_-_The_state_of_the_art.pdf204.93 KB
blass-sensor-public-key-encryption-2005.pdf57.27 KB
Berta_Mann_PP_2002.ps.gz136.6 KB
bellare94optimal.pdf863.36 KB
ace-iso-2.pdf382.27 KB
A_scalable_grouping_random_key_predistribution_scheme.pdf34.56 KB
a_new_NP-complete_problem_and_PK_identification.pdf187.22 KB
a_new_family_of_authentication_protocols.pdf77.82 KB
A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications.pdf276.11 KB
A new identification scheme based on syndrome decoding.pdf118.63 KB
- 6 dossiers - 86 files - 35.44 MB
Realizzato con Drupal, un sistema open source per la gestione dei contenuti