Files

Una piccola raccolta di files informativi di documentazione varia.
In varie pagine farò (implicitamente o esplicitamente) riferimento a files che si possono trovare in queste aree.
Viene ospitato anche un mirror di ZeroShell (sia l'ultima versione "standard" di Fulvio che la versione "di sviluppo" curata da Renato Moraro).

Display namesizeDescrizioneordina icone
TPM
Go up
identity-based
math
randomkey
eccCrittografia a curve ellittiche
Boyko_-_On_the_security_properties_of_OAEP_as_an_All-or-Nothing_transform.ps.gz149.81 KB
NESSIE_Khazad_quadratic_relations.pdf80.95 KB
NESSIE_final_report.pdf4.53 MB
Needham_-_Denial_of_service_An_example.pdf2.83 MB
NESSIE_8051cpu_results_2.pdf62.5 KB
Multiparty_unconditionally_secure_protocols.pdf38.86 KB
Long modular multiplication for cryptographic applications.pdf555.89 KB
Maurer97.pdf230.62 KB
ModMult.pdf555.89 KB
PARIZ_PRNG-imp-ver02.pdf213.69 KB
Relatedkey_attacks_on_3way_Biham-DES_CAST_DES-X_NewDES_RC2_TEA.pdf189.76 KB
The random oracle methodology revisited.pdf400.01 KB
a_new_NP-complete_problem_and_PK_identification.pdf187.22 KB
a_new_family_of_authentication_protocols.pdf77.82 KB
TEA_Cryptanalysis_-_VRAndem.pdf1.73 MB
Shamir_-_A_polynomial_time_algorithm_for_breaking_Merkle-Hellman_cryptosystem.PDF295.43 KB
Rivest_-_All-or-Nothing_encryption_and_the_package_transform.pdf149.23 KB
Rivest_-_All-or-Nothing_encryption_and_the_package_transform.ps106.73 KB
SP800-57-Part1.pdf475.55 KB
Secure group key agreement.pdf1.74 MB
Leighton-Micali - Secret-key agreement without public-key cryptography [UNSAFE].pdf2.32 MB
Khazad-tweak.zip317.15 KB
DES_differential_attacks.pdf125.45 KB
CBC.doc303.5 KB
CHES_2004.pdf165.98 KB
Boyko_-_Exposure-resilient_functions_and_All-or-Nothing_transforms.ps282.92 KB
Block_ciphers_and_stream_ciphers_-_The_state_of_the_art.pdf204.93 KB
A new identification scheme based on syndrome decoding.pdf118.63 KB
A_scalable_grouping_random_key_predistribution_scheme.pdf34.56 KB
A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications.pdf276.11 KB
Berta_Mann_PP_2002.ps.gz136.6 KB
CS0947_-_Cryptanalysis_of_Skipjack_reduced_to_31_rounds.ps.gz73.52 KB
CS0946_-_Cryptanalysis_of_Skipjack-3XOR.ps242.86 KB
How_to_achieve_a_McEliece-based_digital_signature_scheme.ps293.81 KB
Information-theoretic secret key agreement.pdf925.01 KB
Iterative modular multiplication algorithm without magnitude comparison.pdf205.85 KB
GroupKey00.ps170.52 KB
Fast pseudo-Hadamard transforma.pdf149.08 KB
DES_-_fips46-3.pdf178.92 KB
Cryptanalysis_of_the_Bluetooth_E0_cipher_using_OBDDs.pdf275.89 KB
Essential_algebraic_structure_within_the_AES.pdf303.87 KB
De Santis-Di Crescenzo-Persiano - Secret sharing and perfect zero knowledge.pdf983.19 KB
ace-iso-2.pdf382.27 KB
bellare94optimal.pdf863.36 KB
runwalk2.pdf483.5 KB
safer.V1.2.tar.Z97.35 KB
serpent.ps.gz89.46 KB
pkcs-7v16.pdf26 KB
pkcs-7.asn9.5 KB
minrank_authentication_scheme.pdf250.94 KB
pairing-based_identification_schemes.pdf263.73 KB
ping-pong.pdf517.38 KB
pkcs-3.ps82.85 KB
serpent.tar.gz956.64 KB
skipjack-1.01.tar.gz15.03 KB
tiger.ps103.27 KB
tiger.ps.gz51.33 KB
tiger_-_a_fast_new_hash_function.ps103.27 KB
tiger-src.tar.gz16.61 KB
tea17.zip2.48 KB
skipjack_interim_report.txt18.66 KB
tea16.txt9.36 KB
tea16.zip2.53 KB
tea17.txt8.61 KB
md5-attack.pdf184.44 KB
mars.tar.gz2.55 MB
dolev91nonmalleable.pdf348.19 KB
fips186-2-change1.pdf312.3 KB
gf-osr.pdf77.82 KB
despicable-1.01.tar.gz16.72 KB
cs3235-3_-_Introduction_to_computer_security.pdf2.59 MB
blass-sensor-public-key-encryption-2005.pdf57.27 KB
chabaud94security.pdf165.2 KB
chan_randomkey.ps371.72 KB
cramer98practical.pdf191.93 KB
hall97reaction.pdf159.85 KB
intelRNG.pdf72.53 KB
luc_vs_rsa.gz2.03 KB
mars-HW.pdf113.1 KB
mars-attacks.pdf190.59 KB
luc_l3-1.3b.tar.gz114.25 KB
luc-paper.ps.gz70.99 KB
laws_of_cryptography_with_java_code.pdf1.08 MB
luc-0.4.cc24.28 KB
luc-in-bc.tar.gz3.18 KB
luc-paper.pdf77.96 KB
- 6 dossiers - 86 files - 35.44 MB
Realizzato con Drupal, un sistema open source per la gestione dei contenuti