Описание: В данной раздаче представленны книги и статьи по криптографии, квантовой криптографии, криптологии.
ВАЖНО - Структура папок: <BASE> - содержит основную документацию сборника на момент создания раздачи. <#N ussue - DD.MM.YYYY> - данная папка есть обновления на дату DD.MM.YYYY, #N номер обновления.
В корне находится файл КАТАЛОГ.doc с описанием содержимого.
Проделанные работы в раздаче:
27.02.11 - исправлены названия книг, некоторые книги перенесены в соответствующие им разделы. Создана папка История криптографии, о криптографии и безопасности, и сюда перенесены соответствующие книги и добавлены новые. 31.05.11 - добавлены книги и статьи. 18.08.11 - добавлены книги. 01.05.2012 - добавлены статьи и одна диссертация.
Всем кто стоит на раздаче - после каждого обновления необходимо обновлять раздачу!
P.S.: Сидеры не разбегайтесь
Папка <BASE>:(папка) Квантовая крипто A Quantum Leap for Cryptography.pdf A quick glance at quantum cryptography - Lomonaco S. J.djvu Plug and Play quantum cryptography.pdf Quantum cryptography (2002) - group of applied phyzics.pdf Quantum cryptography (2004) - group of applied phyzics.pdf Quantum Information Theory and Applications to Quantum Cryptography - Nikolaos P. Papadakos.pdf
(подпапка квантовой крипто) Статьи: Quantum key distribution over 67 km with a plug&play system.pdf Алгоритм выработки общего ключа с помощью квантового канала связи.pdf Квантовая криптография - Красавин.doc Квантовая криптография - Семенов.doc Квантовая криптография- дорогая игрушка или технология будущего - Винокуров.doc Квантовая криптография- основы разработки и информационное обеспечение.pdf О НЕСТОЙКОСТИ КВАНТОВОЙ КРИПТОГРАФИИ - Горшков.doc О одном подходе к построению квантовых кодов II.pdf О одном подходе к построению квантовых кодов.pdf Что не так с классической криптографией.mht
(папка) Криптография
A Computational Introduction To Number Theory and Algebra (2004) - Victor Shoup.pdf A Computational Introduction To Number Theory And Algebra (2005) - Cambridge University Press.pdf A Course In Number Theory And Cryptography (2nd ed.) - Koblitz Neal.djvu Advances in Elliptic Curve Cryptography (2005) - Cambridge University Press.pdf Applied Cryptography SE Protocols, Algorthms, and Source Code in C (1996) - Bruce Schneier.pdf An Introduction to Cryptography (2nd ed.) - Mollin R.pdf BigNum Math. Implementing Cryptographic Multiple Precision Arithmetic (2006) - Denis T., Rose G.djvu Codes and Ciphers. Julius Caesar the Enigma and the Internet (2004) - Cambridge University Press.pdf Coding and Cryptography (1998) - Korner.pdf Complexity and Cryptography An Introduction (2006) - Cambridge University Press.pdf Contemporary Cryptography (2005) - Artech House.pdf Cracking DES Secrets of Encryption Research, Wiretap Politics, and Chip Design (1998).pdf Cryptographic Hardware and Embedded Systems (2005) - Springer.pdf Cryptographic Security. Architecture, Design and Verification - Springer.pdf Cryptographie - Stinson (france).djvu Cryptography For Dummies (2004) - Cobb.chm Cryptography Theory And Practice - Douglas Stinson.chm Cryptography. A Very Short Intro (2002) - Piper,Murphy.chm Cryptography.An introduction to computer security.1989 - Sebery J.pdf Dr.Dobb's essential books on cryptography and security (1997).rar Elementary Number Theory (2003) - Clark W Edwin.pdf Foundations of Cryptography.pdf Fundamentals of cryptology. A professional reference and interactive tutorial.pdf Generating a Product of Three Primes with an Unknown Factorization.pdf Guide to Elliptic Curve Cryptography - D. Hankerson, A. Menezes, S. Vanstone.pdf Handbook of applied cryptography (1997) - Menezes A., van Oorschot P., Vanstone S.djvu Internet Security. Cryptographic Principles, Algorithms And Protocols (2003) - Man Young Rhee.pdf Lecture Notes on Cryptography (2001) - Goldwasser S., Belare M.pdf Modern Cryptography Protect Your Data with Fast Block Ciphers (2003) -Goots,Izotov,Moldovyan,Moldovya.chm Modern Cryptography Theory and Practice (2003) - By Wenbo Mao.pdf Progress On Cryptography. 25 Years Of Cryptography In China (2003) - Kluwer Academic Pub.pdf Some Applications of coding theory in cryptography (2000) - Doumen,Jeroen.pdf Theorie des nombres et cryptographie (2002) - Arnault F.djvu Алгоритмические основы эллиптической криптографии - Болотов,Горшков,Фролов,Часовских.pdf Анализ и синтез криптоалгоритмов (2000) - Грушо,Применко,Тимонина.pdf Введение в криптографию - Ростовцев.doc Введение в криптографию - Ященко.djvu Ведение в теорию чисел. Алгоритм RSA (2001) - Коутинхо.djvu Дискретная математика и криптология (2003) - Фомичёв.doc Кpиптогpафия от папиpуса до компьютеpа (1996) - Жельников Владимиp.HTM Криптография без секретов - Баричев.djvu Криптография и компьютерная безопасность - Файстель Х..pdf Криптография с открытым ключом (1995) - Салоома.djvu Курс теории чисел и криптографии (2001) - Коблиц.djvu Лекции по арифметическим алгоритмам в криптографии (2002) - Черемушкин.PDF Основы криптографических алгоритмов (2002) - Гатчин о.Р., Коробейников А.Г.pdf Основы современной криптографии - Баричев,Серов.djvu Основы технологии PKI (2004) - Горбатов B.C., Полянская О.Ю.pdf Поточные шифры. Результаты зарубежной открытой криптологии (1997).rar - для просмотра используйте Acrobat Reader v3 Прикладная криптография - Шнайер Б..pdf Прикладная криптография. Использование и синтез криптографических интерфейсов - Щербаков Л.Ю., Домашев А.В.djvu Приложение теории детерминированного хаоса в криптографии (2002) - Птицын.pdf Работы по теории информации и кибернетике (1963) - Шеннон.pdf Совершенные шифры (2003) - Зубов.rar Современная криптология (1999) - Брассар.djvu Статьи по криптографии - Сидельников В.М.djvu Теоретико-числовые алгоритмы в криптографии (2003) - Василенко.PDF Теоретическая криптография - Ростовцев А.Г., Маховенко Е.Б.djvu
(папка) История криптографии, о криптографии и безопасности Cryptography's Role In Securing The Information Society - National Research Council.pdf BODY OF SECRETS - JAMES BAMFORD (2001, 2002).pdf The Codebreakers. The Story of Secret Writing - David Kahn (Macmillan Pub Co, 1974).pdf Взломщики кодов - Дэвид Кан (Центрполиграф, 2000).rtf Зарождение криптографии - Бабаш.rtf История криптографии и криптоанализа.chm История создания и становления Агенства безопасности связи Армии США (1914-1945 гг.) - А. В. Стефанович.rtf Организация системы шифровальной связи в Советском Союзе в период гражданской войны - Чертопруд С.rtf ФРАНЦ ЭПИНУС. Краткая биографическая хроника, 1724 - 1802 гг - Новик В. К.rtf Шифры и революционеры России - Синельников А. В.html
(папка) Манулы Construction of a pseudo-random generator from any one-way function.pdf Алгоритмический подход к квантовой физике.pdf Асимметричный криптографический алгоритм на базе Конечно-Автоматной Модели, Сохраняющей Информацию.doc Асимметричный криптографический алгоритм на базе Конечно-Автоматной Модели, Сохраняющей Информацию.pdf Методика комплексной оценки рисков утечки информации в корпо.doc О корреляционно-имунных и устойчивых булевых функциях.pdf Однонаправленная функция с «секретом» на базе КАМСИ.pdf Основные тенденции развития открытой криптографии.rar Проблема аутентификации данных и блочные шифры - Винокуров.DOC
(папка) Программирование Beginning Cryptography With Java (2005).chm Introduction to Cryptography with Java Applets - Jones & Bartlett Publishers.pdf Java Cryptography - Knudsen.pdf Java Cryptography (Examples).zip .Net security and cryptography (2003) - Peter Thorsteinson, G. Gnana Arun Ganesh.chm .Net security and cryptography (2003) - Peter Thorsteinson, G. Gnana Arun Ganesh.pdf Oracle Cryptographic Toolkit Programmer's Guide 2.0.4.pdf Programming .NET Security (2003) - Freeman,Jones.chm Secure Programming Cookbook for C and C++ (2003) - Messier,Viega.chm The laws of cryptography with Java code (2003) - Wagner.ZIP Теория и практика защиты программ - Казарин О.В.pdf Папки: Исходники - содержит исходники различных криптографических алгоритмов. Словари - словари криптографических терминов и определений. Ссылки - некоторые полезные ссылки (крипто). Статьи - сборник статей по криптографии.
ОБНОВЛЕНИЯ
Папка <#1 ussue - 19.07.2010>
Книги на русском:01 - 25 этюдов о шифрах - С.А.Дориченко, 1994.djvu 02 - Алгоритмы шифрования.Справочник. - Панасенко, 2009.djvu 03 - Дискретная математика и комбинаторика - Андерсон, 2004.djvu 04 - Компьютерные сети - Таненбаум, 2003.djvu 05 - Криптография. Мир программирования - Смарт, 2005.pdf 06 - Криптография и теория кодирования - Сидельников.djvu 07 - Криптография на С и С++ в действии. Учебное пособие - Вельшенбах, 2004.djvu 07 - Криптография на С и С++ в действии. Учебное пособие - Вельшенбах, 2004 (CD-DISK).rar 08 - Основы современной криптографии для специалистов в информационных технологиях - Рябко, Фионов, 2004.djvu 09 - Практическая криптография - Фергюсон, 2005.djvu 10 - Современная криптография. Теория и практика - Венбо Мао, 2005.djvu Книги на английском:[01] A Classical Introduction to Cryptography Exercise Book - Springer, 2005.pdf [02] Advanced Encryption Standard - AES 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004 - Springer, 2005.pdf [03] Advances in Cryptology - Crypto 2004 24th Annual International Cryptology Conference, Santa Barbara, California - Springer, 2005.pdf [04] An Introduction to Formal Languages and Automata - Jones and Bartlett Publishers, 2000.pdf [05] An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics) - Springer, 2008.pdf [06] Applied Cryptanalysis Breaking Ciphers in the Real World - John Wiley & Sons, 2007.pdf [07] Automata Theory with Modern Applications - Cambridge University Press, 2006.pdf [08] Basics of Contemporary Cryptography for IT Practitioners - World Scientific Publishing, 2005.pdf [09] CCNA Security Course Booklet, Version 1.0 - Cisco Press, 2009.pdf [10] CCNA Security Lab Manual - Cisco Press, 2009.pdf [11] CISSP Certification All-in-One Exam Guide, 4th Ed. (All-in-One) - McGraw-Hill, 2007.pdf [12] CompTIA Security+ All-in-One Exam Guide, Second Edition - McGraw-Hill, 2008.pdf [13] Comptia security 2008 in depth - Course technology, 2009.pdf [14] Cryptanalysis - Dover Publications, 1989.pdf [15] Cryptographic Hardware and Embedded Systems - CHES 2002 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002 - Springer, 2003.pdf [16] Cryptographic Hardware and Embedded Systems - CHES 2004 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings - Springer, 2005.pdf [17] Cryptographic Hardware and Embedded Systems - CHES 2005 7th International Workshop - Springer, 2005.pdf [18] Cryptography and Network Security (4th Edition) - Prentice Hall, 2005.chm [19] Cryptography and Public Key Infrastructure on the Internet - John Wiley & Sons, 2001.pdf [20] Cryptography and security services mechanisms and applications - Cybertech Publishing, 2007.pdf [21] Cryptography and Security Services Mechanisms and Applications - Cybertech Publishing, 2008.pdf [22] Disappearing cryptography second edition information hiding steganography and watermarking - Morgan Kaufmann Publishers, 2002.pdf [23] Disappearing cryptography third edition information hiding steganography watermarking - Morgan Kaufmann Publishers, 2009.pdf [24] Error Correcting Coding and Security for Data Networks - Analysis of the Superchannel Concept - John Wiley & Sons, 2005.pdf [25] Finite Automata and Application to Cryptography - Springer, 2009.pdf [26] Handbook of Remote Biometrics- for Surveillance and Security (Advances in Pattern Recognition) - Springer, 2009.pdf [27] Hardware-based Computer Security Techniques to Defeat Hackers- From Biometrics to Quantum Cryptography - John Wiley & Sons, 2008.pdf [28] Innovative Cryptography (Programming Series) - Charles River, 2006.pdf [29] Introduction to Automata Theory, Languages, and Computation (2nd Edition) - Addison Wesley, 2000.pdf [30] Mathematical Foundations of Computer Science 2008 - 33rd International Symposium, MFCS 2008, Torun, Poland, August 25-29, 2008, Proceedings - Springer, 2008.pdf [31] Mechanics of User Identification and Authentication- Fundamentals of Identity Management - Auerbach Publications, 2007.pdf [32] Multimedia Content Encryption - Techniques and Applications - Auerbach Publications, 2008.pdf [33] Pairing-Based Cryptography Pairing 2008 - Second International Conference, Egham, UK, September 1-3, 2008, Proceedings (Lecture Notes in Computer Science) - Springer, 2008.pdf [34] Post Quantum Cryptography - Springer, 2008.pdf [35] Practical Cryptology and Web Security - Pearson Education, 2005.pdf [36] Quantum Optics (Oxford Graduate Texts) - Oxford University Press, 2008.pdf [37] Secure key establishment advances in information security - Springer, 2009.pdf [38] Secure multi-party non-repudiation protocols and applications advances in information security - Springer, 2009 [39] Security and Cryptography for Networks 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings - Springer, 2008.pdf [40] The Twofish Encryption Algorithm A 128-Bit Block Cipher - John Wiley & Sons, 1999.chm [41] Understanding Cryptography A Textbook for Students and Practitioners - Springer, 2009.pdf
Папка <#2 ussue - 08.08.2010>
Папка <Articles>A Domain Extender for the Ideal Cipher - J.S. Coron, Y. Dodis, A. Mandal and Y. Seurin (Proceedings of TCC 2010, LNCS, 2010).pdf A New Algorithm for Switching from Arithmetic to Boolean Masking -J.S. Coron and A. Tchulkine (Proceedings of CHES '03, Lecture Notes in Computer Science, Springer-Verlag, 2003).pdf A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis - J.S. Coron, D. Lefranc and G. Poupard (Proceedings of CHES 2005, LNCS, 2005).pdf A New DPA Countermeasure Based on Permutation Tables - J.S. Coron (Proceedings of SCN 2008, LNCS, 2008).pdf An accurate evaluation of maurer's universal test - J.S. Coron and D. Naccache (Proceedings of SAC'98, Lecture Notes in Computer Science, Springer-Verlag, 1998 ).pdf An Efficient Method for Random Delay Generation in Embedded Software - J.S. Coron and I. Kizhvatov (Proceedings of CHES 2009, LNCS, 2009).pdf Analysis and Improvement of the Random Delay Countermeasure of CHES 2009 - J.S. Coron and I. Kizhvatov (Proceedings of CHES 2010, LNCS, 2010).pdf Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform - J.S. Coron, C. Giraud etc (Proceedings of CHES 2008, LNCS, 2008).pdf Boneh et al's k-Element Aggregate Extraction Assumption Is Equivalent to The Diffie-Hellman Assumption - J.S. Coron and D. Naccache (Proceedings of Asiacrypt '03, Lecture Notes in Computer Science, Springer-Verlag, 2003).pdf Cryptanalysis of a Provably Secure CRTRSA - David Wagner (University of California at Berkeley) article.pdf Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95 - J.S. Coron and D. Naccache (Proceedings of CT-RSA 2004, Lecture Notes in Computer Science, Springer-Verlag, 2004).pdf Cryptanalysis of ISO-IEC 9796-1 - Don Coppersmith, Jean-Sebastien Coron etc (Journal of Cryptology, Volume 21, Number 1, 2008).pdf Cryptanalysis of RSA signatures with fixed pattern padding - E. Brier, C. Clavier (Proceedings of Crypto '01, Lecture Notes in Computer Science, Springer-Verlag, 2001).pdf Deterministic Polynomial-Time Equivalence of Computing the RSA Secret Key and Factoring - Jean-Sebastien Coron and Alexander May (Journal of Cryptology, Volume 20, Number 1, January 2007).pdf Efficient Indifferentiable Hashing into Ordinary Elliptic Curves - E. Brier, J.S. Coron (Proceedings of CRYPTO 2010, LNCS, 2010).pdf Fault Attacks Against EMV Signatures - J.S. Coron, D. Naccache and M. Tibouchi (Proceedings of CT-RSA 2010, LNCS, 2010).pdf Fault Attacks on RSA Signatures with Partially Unknown Messages - J.S. Coron, A. Joux etc (Proceedings of CHES 2009, LNCS, 2009).pdf Finding collisions in the full SHA-1 - X. Wang and H. Yu (Crypto'05. Santa Barbara, CA, 2005).pdf Finding small roots of bivariate integer equations revisited - J.S. Coron (Proceedings of Eurocrypt 2004, LNCS, 2004).pdf Finding Small Roots of Bivariate Integer Polynomial Equations - a Direct Approach - J.S. Coron (Proceedings of Crypto 2007, LNCS, 2007).pdf From fixed-length to arbitrary length RSA padding schemes - J.S. Coron, F. Koeune and D. Naccache (Proceedings of Asiacrypt '00, Lecture Notes in Computer Science, Springer-Verlag, 2000).pdf GEM. a Generic Chosen-Ciphertext Secure Encryption Method - J.S. Coron, H. Handschuh etc (Proceedings of CT-RSA '02, Lecture Notes in Computer Science, Springer-Verlag, 2002).pdf Index Calculation Attacks on RSA Signature and Encryption - J.S. Coron, Y. Desmedt etc (Des. Codes Cryptography, vol. 38, Number 1, January, 2006).pdf Merkle-Damgard Revisited- how to construct a hash-function - J.S. Coron, Y. Dodis (Proceedings of Crypto 2005, LNCS, 2005).pdf New attacks on PKCS#1 v1.5 encryption - J.S. Coron, D. Naccache, M. Joye and P. Paillier (Proceedings of Eurocrypt '00, Lecture Notes in Computer Science, Springer-Verlag, 2000).pdf On Boolean and Arithmetic Masking against Differential Power Analysis - J.S. Coron and L. Goubin (Proceedings of CHES '00, Lecture Notes in Computer Science, Springer-Verlag, 2000).pdf On the exact security of Full Domain Hash - J.S. Coron (Proceedings of Crypto '00, Lecture Notes in Computer Science, Springer-Verlag, 2000).pdf On the Implementation of a Fast Prime Generation Algorithm - C. Clavier and J.S. Coron (Proceedings of CHES 2007, LNCS, 2007).pdf On the security of random sources - J.S. Coron (Proceedings of PKC '99, Lecture Notes in Computer Science, Springer-Verlag, 1999).pdf On the security of RSA padding - J.S. Coron, D. Naccache and J.P. Stern (Proceedings of Crypto '99, Lecture Notes in Computer Science, Springer-Verlag, 1999).pdf Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages - J.S. Coron, H. Handschuh etc (Proceedings of PKC '02, Lecture Notes in Computer Science, Springer-Verlag, 2002).pdf Optimal security proofs for PSS and other signature schemes - J.S. Coron (Proceedings of Eurocrypt '02, Lecture Notes in Computer Science, Springer-Verlag, 2002).pdf Practical Cryptanalysis of ISO - IEC 9796-2 and EMV Signatures - J.S. Coron, D. Naccache etc (Proceedings of Crypto 2009, LNCS, 2009).pdf PSS is Secure against Random Fault Attacks - J.S. Coron and A. Mandal (Proceedings of ASIACRYPT 2009, LNCS, 2009).pdf Quantum Cryptography Based on Bell's Theorem - Artur K. Ekert (1991).pdf Quantum Cryptography. A study into the present technologies and future applications - Bill Grindlay (2003).pdf Quantum Cryptography. Public key distribution and coin tossing - C. H. Bennett and G. Brassard (1984).pdf Resistance against Differential Power Analysis for elliptic curves cryptosystems - J.S. Coron (Proceedings of CHES '99, Lecture Notes in Computer Science, Springer-Verlag, 1999).pdf Security analysis of the Gennaro-Halevi-Rabin signature scheme - J.S. Coron and D. Naccache (Proceedings of Eurocrypt '00, Lecture Notes in Computer Science, Springer-Verlag, 2000).pdf Side Channel Cryptanalysis of a High Order Masking Scheme - J.S. Coron and E. Prouff and M. Rivain (Proceedings of CHES 2007, LNCS, 2007).pdf The Random Oracle Model and the Ideal Cipher Model are Equivalent - J.S. Coron, J. Patarin and Y. Seurin (Proceedings of Crypto 2008, LNCS, 2008).pdf Universal padding schemes for RSA - J.S. Coron, M. Joye, D. Naccache and P. Paillier (Proceedings of Crypto '02, Lecture Notes in Computer Science, Springer-Verlag, 2002).pdf Книги на русском:01 - Аутентификация. От паролей до открытых ключей - Ричард Э. Смит (Вильямс, 2002).djvu 02 - Булева алгебра, комбинационные схемы, преобразования двоичных последовательностей - И. Л. Ерош (СПб. ГУАП, 2001).pdf 03 - Булевы функции в теории кодирования и криптологии -.О. А. Логачев, А. А. Сальников, В. В. Ященко (МЦНМО,2 004).djvu 04 - Дискретная математика и криптология. Курс лекций - В. М. Фомичев (Диалог-МИФИ, 2003).djvu 05 - Защита информации в компьютерных системах и сетях - Ю. В. Романец, П. А. Тимофеев, В. Ф. Шаньгин (Радио и связь, 2001).djvu 06 - Компьютерная безопасность. Криптографические методы защиты - Петров А.А (2000).djvu 07 - Криптографические методы защиты информации - Рябко Б.Я., Фионов А.Н ()Горячая Линия - Телеком, 2005.djvu 08 - Математические основы криптологии - Ю. С. Харин, В. И. Берник и т.д. (БГУ, 1999).djvu 09 - Основы кодирования - М. Вернер (Техносфера, 2004).pdf 10 - Основы криптографии - А. П. Алферов, А. Ю. Зубов, А. С. Кузьмин, А. В. Черемушкин (Гелиос АРВ, 2005).djvu 11 - Основы Криптологии. Профессиональное руководство и интерактивный учебник - CD-DISK.rar 11 - Основы Криптологии. Профессиональное руководство и интерактивный учебник - Х.К.А.ван Тилборг (МИР, 2006).pdf 12 - Словарь криптографических терминов - Погорелов Б.А. (ред) (2006).pdf 13 - Стандарт криптографической защиты - AES. Конечные поля - О. С. Зензин, М. А. Иванов (КУДИЦ-Образ, 2002).djvu 14 - Физика квантовой информации - Боумейстер.и.др (2002).djvu 15 - Элементы криптографии. Основы теории защиты информации - В. И. Нечаев (Высшая школа, 1999).djvu Книги на английском:[01] A brief introduction of quantum cryptography for engineers - Bing Qi, Li Qian, Hoi-Kwong Lo (arXiv, 2010).pdf [02] Algorithmic Cryptanalysis - Antoine Joux (Chapman & Hall or CRC, 2009).pdf [03] Applied Quantum Cryptography - Christian Kollmitzer, Mario Pivk (Springer, 2010).pdf [04] Brute Force - Cracking the Data Encryption Standard - Matt Curtin (Springer, 2005).pdf [05] Codes- The Guide to Secrecy From Ancient to Modern Times - Richard A. Mollin (Chapman & Hall or CRC, 2005).pdf [06] Codes and Cryptography - Dominic Welsh (Oxford University Press, 1998).djvu [07] Codes An Introduction to Information Communication and Cryptography - Norman L. Biggs (Springer, 2008).pdf [08] Codes over Rings (Series on Coding Theory and Cryptology) - Patrick Solo (World Scientific Publishing Company, 2009).pdf [09] Coding and Cryptology - Yongqing Li, San Ling, Harald NiederreiterHuaxiong (World Scientific Publishing Company, 2008).pdf [10] Cracking Codes and Cryptograms For Dummies - Denise Sutherland, Mark Koltko-Rivera (For Dummies, 2009).pdf [11] CRYPTANALYSIS OF RSA USING ALGEBRAIC AND LATTICE METHODS - Glenn Durfee (2002) a dissertation.pdf [12] Cryptographic Algorithms on Reconfigurable Hardware (Signals and Communication Technology) - Francisco Rodriguez-Henriquez, N.A. Saqib, A. Diaz-Perez, Cetin Kaya Koc (Springer, 2006).pdf [13] Cryptographic Engineering - Cetin Kaya Koc (Springer, 2008).pdf [14] Cryptography for Developers - Tom St Denis (Syngress Publishing, 2006).pdf [15] Cryptography for Internet & Database Applications - Nick Galbreath, Nicholas Galbreath (Wiley, 2002).pdf [16] Cryptography in C and C++, Second Edition - Michael Welschenbach (Apress, 2005).pdf [17] Cryptography in C and C++ - Michael Welschenbach (Apress, 2001).chm [18] Cryptology Unlocked - Reinhard Wobst, Angelika Shafir (Wiley, 2007).pdf [19] Decrypted Secrets. Methods and Maxims of Cryptology - Friedrich L. Bauer (Springer, 4th ed. edition, 2006).pdf [20] Digital Signatures (Advances in Information Security) - Jonathan Katz (Springer, 2010).pdf [21] Elliptic Curves - Number Theory and Cryptography, Second Edition - Lawrence C. Washington (Chapman & Hall or CRC, 2008).rar [22] Elliptic Curves and Their Applications to Cryptography. An Introduction - Andreas Enge (Springer, 1999).pdf [23] Information Security. Fundamentals - John A. Blackley , Justin Peltier, Thomas R. Peltier (Auerbach Publications, 2003).pdf [24] Introduction to Cryptography - Johannes Buchmann (Springer, 2000).pdf [25] Kerberos- The Definitive GuideKerberos - Jason Garman (O'Reilly 2003).chm [26] Kryptologie- Algebraische Methoden und Algorithmen - Christan Karpfinger, Hubert Kiechle (Vieweg+Teubner Verlag, 2009) German.pdf [27] Learn Encryption Techniques with Basic And C++ - Gilbert Held (Wordware Publishing, 1998).chm [28] Malicious Cryptography. Exposing Cryptovirology - Adam Young, Moti Yung (Wiley, 2004).pdf [29] Number Theory and related Algorithms in Cryptography - Alireza Nemaney Pour,2002.pdf [30] Progress in Cryptology. Africacrypt 2010 - Daniel J. Bernstein, Tanja Lange (Springer, 2010).pdf [31] Protecting Information. From Classical Error Correction to Quantum Cryptography - Loepp,Wootters (Cambridge University Press, 2006).pdf [32] Public Key Cryptography. PKC 2010 - Phong Q. Nguyen, David Pointcheval (Springer, 2010).pdf [33] Quantum Computation and Quantum Information - Michael A. Nielsen (Cambridge University Press, 2000).djvu [34] Quantum Cryptography - N. Gisin, G. Ribordy, W. Tittel, H. Zbinden (arXiv, 2001).pdf [35] RSA and Public-Key Cryptography - Richard A. Mollin (Chapman & Hall or CRC, 2002).rar [36] RSA Security's Official Guide to Cryptography - Steve Burnett, Stephen Paine (McGraw-Hill Osborne Media, 2001).pdf [37] ]SSL & TLS Essentials. Securing the Web free - Stephen A. Thomas (Wiley, 2000).pdf [38] The Code Book- The Science of Secrecy from Ancient Egypt to Quantum Cryptography - SIMON SINGH (Anchor , 2000).pdf [39] The Cryptoclub - Using Mathematics to Make and Break Secret Codes - Janet Beissinger, Vera Pless (AK Peters Ltd, 2006).djvu [39] The Cryptoclub - Using Mathematics to Make and Break Secret Codes - WorkBook.pdf [40] The Mathematics of Ciphers - Number Theory and RSA Cryptography - S. C. Coutinho (AK Peters, Ltd, 1998).pdf [41] The Physics Of Quantum Information Quantum Cryptography, Teleportation, Computation - Bouwmeester et al. (Springer, 2000).djvu [42] Understanding PKI. Concepts, Standards, and Deployment Considerations. Second Edition - Carlisle Adams, Steve Lloyd (Addison Wesley, 2002).chm [43] User's Guide To Cryptography And Standards - Alex W. Dent, Chris J. Mitchell (Artech House, 2004).pdf
Папка <Articles>Reversible Data Hiding in the Spatial and Frequency Domains - Ching-Yu Yang, Wu-Chih Hu.pdf SECURING TRANSACTION IMAGE FILES USING DIGITAL WATERMARKING - RONALD EDEN BURTON (2006).pdf Transparency Benchmarking on Audio Watermarks and Steganography - Christian Kraetzera, etc.(2006).pdf Книги на английском:[01] Cryptanalytic Attacks on RSA - Springer (2007).pdf [02] Digital Watermarking and Steganography, 2nd Ed. - Morgan Kaufmann (2008).pdf [03] Digital Watermarking for Digital Media - Information Science Publishing (2005).pdf [04] Disappearing Cryptography, Second Edition - Information Hiding- Steganography and Watermarking - Morgan Kaufmann (2002).pdf [05] Disappearing Cryptography, Third Edition- Information Hiding- Steganography & Watermarking - Morgan Kaufmann (2008).pdf [06] Hiding in Plain Sight- Steganography and the Art of Covert Communication - John Wiley & Sons (2003).pdf [07] Information Hiding- 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers (Lecture Notes in Computer Science) - Springer (2008).pdf [08] Intelligent Multimedia Data Hiding- New Directions (Studies in Computational Intelligence) - Springer (2007).pdf [09] Investigator's Guide to Steganography - Auerbach Publications (2003).chm [10] Multimedia Security Handbook - CRC Press (2004).pdf [11] Network Security Bible - John Wiley & Sons (2005).pdf [12] Secure Communicating Systems- Design, Analysis, and Implementation, Cambridge University Press, 2001.pdf [13] Transactions on Data Hiding and Multimedia Security II - (Lecture Notes in Computer Science), Springer, 2007.pdf [14] Watermarking Systems Engineering - CRC Press, 2004.pdf
Папка <#5 ussue - 18.08.2011>
Книги на английском:[01] Advanced Statistical Steganalysis (Information Security and Cryptography) - Rainer Bohme (Springer,2010) .pdf [02] Advances in Coding Theory and Crytography (Series on Coding Theory and Cryptology) - T. Shaska, W. C. Huffman, D. Joyner.pdf [03] Advances in Cryptology - ASIACRYPT 2009. 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan - Mitsuri Matsui.djvu [04] Advances in Cryptology - ASIACRYPT 2010 (Masayuki Abe).pdf [05] Advances in Cryptology - CRYPTO 2008. 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, 2008, Proceedings - David Wagner.pdf [06] Advances in Cryptology - EUROCRYPT 2000. International Conference on the Theory and Application of Cryptographic Techniques Bruges, Belgium, May 14-18 - Bart Preneel.pdf [07] Advances in Cryptology - EUROCRYPT 2005. 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark etc (Lecture Notes in Comp Science) - Ronald Cramer.pdf [08] Advances in Cryptology - EUROCRYPT 2011. 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, held in Tallinn, Estonia, in May 2011.pdf [09] Advances in Cryptology ASIACRYPT 2007. 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia - Kaoru Kurosawa.pdf [10] Advances in Cryptology EUROCRYPT 2008. 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey (Lecture Notes in Computer Science) - Nigel Smart.pdf [11] Codes, Ciphers, and Secret Languages - Fred B. Wrixon (1989).djvu [12] Cryptanalysis of RSA and Its Variants - M. Jason Hinek(Chapman & Hall Crc Cryptography and Network Security, 2009).pdf [13] Cryptographic Boolean Functions and Applications (first. ed.)- Thomas W. Cusick, Pantelimon Stanica (Academic Press, 2009).pdf [14] Cryptographic Hardware and Embedded Systems. CHES 2003 - Colin D. Walter, Cetin K. Koc, Cristof Paar (Springer,2003).pdf [15] Digital Watermarking, 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers - Hyoung-Joong Kim, Yun Q. Shi, Mauro Barni (Springer, 2011).pdf [16] Elementary Number Theory, Cryptography and Codes (Universitext) - M. Welleda Baldoni, Ciro Ciliberto, G.M. Piacentini Cattaneo (Springer,2008).pdf [17] Information Security, Coding Theory and Related Combinatorics. Information Coding and Combinatorics - Volume 29 NATO Science for Peace and Security Series - D. Crnkovic, V. Tonchev (2011).pdf [18] Information Security and Privacy (ACISP 2011) - Udaya Parampalli, Philip Hawkes.pdf [19] Number Theory in Science and Communication. With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity, 5th Edition - Manfred Schroeder(Springer,2008).pdf [20] Pairing-Based Cryptography - Pairing 2010. 4th International Conference, Yamanaka Hot Spring, Japan, December 13-15, 2010, Proceedings - Marc Joye, Atsuko Miyaji, Akira Otsuka.pdf [21] Public Key Cryptography - PKC 2009, 12 conf.pdf [22] Quantum Information. An Overview - Gregg Jaeger (2006).pdf
Папка <#6 ussue - 01.05.2012>
Папка <Articles>:Continuous-variable quantum key distribution protocols over noisy channels - Raul Garcıa-Patron, Nicolas (25 june 2009) .pdf Continuous variable entanglement distillation of Non-Gaussian Mixed States - Ruifang Dong, Mikael Lassen, Joel Heersink etc (February 1, 2010) .pdf Feasibility of continuous-variable quantum key distribution with noisy coherent states - Vladyslav C. Usenko, Radim Filip (January 21, 2010) .pdf Gaussian Quantum Information - Christian Weedbrook, Stefano Pirandola etc (October 17, 2011) .pdf Quantum cryptography - Wolfgang Tittel and Hugo Zbinden (University of Geneva, February 1, 2008) .pdf Quantum Cryptography Approaching the Classical Limi - tChristian Weedbrook, Stefano Pirandola etc (February 17, 2011) .pdf Quantum Information with Optical Continuous Variables. From Bell Tests to Key Distribution - Nicolas CERF (Ann´ee Acad´emique 2007–2008) .pdf Quantum key distribution over 25 km with an all-fiber continuous-variable system - Jerome Lodewyck, Matthieu Bloch etc.pdf The Security of Practical Quantum Key Distribution - Valerio Scarani 1,2, Helle Bechmann-Pasquinucci etc (September 30, 2009).pdf
Сейчас эту тему просматривают: нет зарегистрированных пользователей и гости: 1
Вы не можете начинать темы Вы не можете отвечать на сообщения Вы не можете редактировать свои сообщения Вы не можете удалять свои сообщения Вы не можете добавлять вложения
Ресурс не предоставляет электронные версии произведений, а занимается лишь коллекционированием и каталогизацией ссылок, присылаемых и публикуемых на форуме нашими читателями. Если вы являетесь правообладателем какого-либо представленного материала и не желаете чтобы ссылка на него находилась в нашем каталоге, свяжитесь с нами и мы незамедлительно удалим её. Файлы для обмена на трекере предоставлены пользователями сайта, и администрация не несёт ответственности за их содержание. Просьба не заливать файлы, защищенные авторскими правами, а также файлы нелегального содержания!