Index of /ca.cdn.preterhuman.net/texts/cryptography

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[TXT]2xWeakDES.txt2012-10-01 13:35 10K 
[TXT]2x_Isolated_Double-DES-Another_Weak_Two-Level_DES_Structure.txt2012-10-01 13:35 9.8K 
[TXT]2xdesfou.txt2012-10-01 13:36 6.5K 
[TXT]2xisolat.txt2012-10-01 13:35 9.8K 
[TXT]20thCenturyCryptoSpeech.txt2012-10-01 13:35 25K 
[   ]4212582_.par2012-10-01 13:35 19K 
[   ]4405829.riv2012-10-01 13:35 90K 
[   ]4424414.hel2012-10-01 13:35 30K 
[   ]4562305.gaf2012-10-01 13:36 19K 
[   ]An End-to-End Systems Approach to Elliptic Curve Cryptography.pdf2012-10-01 13:36 187K 
[   ]An Introduction To Cryptography.pdf2012-10-01 13:35 823K 
[TXT]Announcing_the_Data_Encryption_Standard(DES).txt2012-10-01 13:35 19K 
[TXT]Answers_To_FAQs_About_Todays_Cryptography.txt2012-10-01 13:36 165K 
[   ]Applied Cryptography Second Edition Protocols Algorithms And Source Code In C.zip2012-10-01 13:35 4.1M 
[TXT]Avoiding_bogus_encryption_products-FAQ.txt2012-10-01 13:36 31K 
[TXT]Beginners_Guide_to_PGP.txt2012-10-01 13:35 55K 
[TXT]BernsteinNIST-RSALetter.txt2012-10-01 13:36 24K 
[   ]Block Ciphers And Cryptanalysis.pdf2012-10-01 13:35 241K 
[TXT]Blowfish-Paper_from_Dec_94_Conference.txt2012-10-01 13:35 30K 
[   ]Body of Secrets.pdf2012-10-01 13:36 4.3M 
[TXT]Brief_History_Of_Cryptography,_A.txt2012-10-01 13:35 6.0K 
[   ]Bruce Schneier - Applied Cryptography, Second Edition.pdf2012-10-01 13:36 8.3M 
[TXT]CFP2CryptoTranscript.txt2012-10-01 13:35 66K 
[TXT]CFP4CryptoTranscript.txt2012-10-01 13:35 50K 
[   ]CISSP Study Guide On Cryptography.pdf2012-10-01 13:35 354K 
[TXT]CMEs_Cryptography_Timeline.html2012-10-01 13:35 28K 
[TXT]CPSRBrooksLetter.txt2012-10-01 13:35 19K 
[TXT]CPSR_Letter_on_Crypto_Polic.txt2012-10-01 13:35 23K 
[   ]CRISIS - Cryptography's Role in Securing the Information Society.pdf2012-10-01 13:36 1.4M 
[   ]Cambridge University Press. Advances in Elliptic Curve Cryptography (2005).pdf2012-10-01 13:35 4.7M 
[TXT]CipherHistoryBiblio.txt2012-10-01 13:36 3.3K 
[TXT]Cipher_History_Bibliography.txt2012-10-01 13:35 3.3K 
[TXT]Cloak.txt2012-10-01 13:35 14K 
[TXT]Cloning_Razor_Blades_Keywords-Signatures,_Authorization.txt2012-10-01 13:35 9.1K 
[   ]Cloning and Cryptography with Quantum Continuous Variables.pdf2012-10-01 13:35 177K 
[   ]Codierungstheorie und Kryptographie.pdf2012-10-01 13:35 2.3M 
[   ]Coding and Cryptography.pdf2012-10-01 13:35 506K 
[TXT]Conventional_cryptography_before_public_key.txt2012-10-01 13:35 6.5K 
[TXT]Cracking_the_Code.txt2012-10-01 13:35 17K 
[TXT]CryptBiblio.txt2012-10-01 13:35 23K 
[TXT]CryptBookstoresList.txt2012-10-01 13:35 1.9K 
[TXT]CryptFTPList.txt2012-10-01 13:36 499  
[TXT]CryptJournalsList.txt2012-10-01 13:35 6.8K 
[TXT]CryptWiredArticles.txt2012-10-01 13:35 52K 
[TXT]Cryptanalysis_and_Attacks_on_Cryptosystems.txt2012-10-01 13:36 3.1K 
[TXT]CryptoDictionary.txt2012-10-01 13:35 27K 
[TXT]CryptoFAQ.txt2012-10-01 13:35 119K 
[TXT]CryptoIntro.txt2012-10-01 13:35 40K 
[TXT]CryptoTrends.txt2012-10-01 13:35 64K 
[TXT]Crypto_Anarchist_Manifesto,_The.txt2012-10-01 13:35 3.8K 
[TXT]Crypto_Anarchy_and_Virtual_Communities.txt2012-10-01 13:36 41K 
[   ]Crypto_before_public_key2012-10-01 13:35 6.5K 
[TXT]CryptoanarchistManifesto.txt2012-10-01 13:35 4.8K 
[   ]Cryptographic Token Interface Standard - RSA Labs.pdf2012-10-01 13:36 957K 
[TXT]Cryptographic_Uses_of_Polygonal_Sequences,_The.txt2012-10-01 13:35 8.2K 
[   ]Cryptography, C - Applied Cryptography 2nd Edition Protocols, Algorthms, And Source Code In C.pdf2012-10-01 13:35 2.8M 
[   ]Cryptography, Java - Introduction To Cryptography With Java Applets.pdf2012-10-01 13:36 9.7M 
[   ]Cryptography, Java - Java Cryptography.pdf2012-10-01 13:35 1.5M 
[   ]Cryptography, Theory and Practice (1995).chm2012-10-01 13:35 15M 
[   ]Cryptography - An Introduction To Cryptography.pdf2012-10-01 13:35 823K 
[   ]Cryptography - Block Ciphers And Cryptanalysis.pdf2012-10-01 13:35 241K 
[   ]Cryptography - Body of Secrets.pdf2012-10-01 13:35 4.3M 
[   ]Cryptography - CISSP Study Guide On Cryptography.pdf2012-10-01 13:35 354K 
[   ]Cryptography - Codierungstheorie und Kryptographie.pdf2012-10-01 13:35 2.3M 
[   ]Cryptography - Theory And Practice.pdf2013-07-20 15:35 17M 
[   ]Cryptography And Data Security.pdf2012-10-01 13:35 1.6M 
[TXT]CryptographyFAQ.txt2012-10-01 13:35 120K 
[   ]Cryptography FAQ Part 012012-10-01 13:35 6.2K 
[   ]Cryptography FAQ Part 022012-10-01 13:35 4.2K 
[   ]Cryptography FAQ Part 032012-10-01 13:35 12K 
[   ]Cryptography FAQ Part 042012-10-01 13:35 10K 
[   ]Cryptography FAQ Part 052012-10-01 13:35 21K 
[   ]Cryptography FAQ Part 062012-10-01 13:35 14K 
[   ]Cryptography FAQ Part 072012-10-01 13:35 3.6K 
[   ]Cryptography FAQ Part 082012-10-01 13:36 19K 
[   ]Cryptography FAQ Part 092012-10-01 13:35 8.3K 
[   ]Cryptography FAQ Part 102012-10-01 13:36 18K 
[TXT]CryptographyTimeline.html2012-10-01 13:36 28K 
[TXT]Cryptography_Export_Control_Archives.txt2012-10-01 13:35 18K 
[TXT]Cryptography_FAQ,_The.txt2012-10-01 13:35 110K 
[TXT]Cryptography_FAQ_(03-10_Basic_Cryptology).txt2012-10-01 13:35 80K 
[TXT]Cryptography_FAQ_Part_01.txt2012-10-01 13:35 6.2K 
[TXT]Cryptography_FAQ_Part_02.txt2012-10-01 13:35 4.2K 
[TXT]Cryptography_FAQ_Part_03.txt2012-10-01 13:35 12K 
[TXT]Cryptography_FAQ_Part_04.txt2012-10-01 13:36 10K 
[TXT]Cryptography_FAQ_Part_05.txt2012-10-01 13:35 21K 
[TXT]Cryptography_FAQ_Part_06.txt2012-10-01 13:36 14K 
[TXT]Cryptography_FAQ_Part_07.txt2012-10-01 13:35 3.6K 
[TXT]Cryptography_FAQ_Part_08.txt2012-10-01 13:35 19K 
[TXT]Cryptography_FAQ_Part_09.txt2012-10-01 13:35 8.3K 
[TXT]Cryptography_FAQ_Part_10.txt2012-10-01 13:35 18K 
[TXT]Cryptography_Standards_&_Infrastructures_for_the_21st_Century.txt2012-10-01 13:35 19K 
[TXT]CypherpunkManifesto.txt2012-10-01 13:35 5.1K 
[TXT]DESSrcBiblio.txt2012-10-01 13:35 1.9K 
[TXT]DES_Fact_Sheet.txt2012-10-01 13:35 22K 
[TXT]Data_Encryption-Fast_&_Secure.txt2012-10-01 13:35 16K 
[TXT]Decryption_of_Win95_Passwords.txt2012-10-01 13:35 10K 
[TXT]Demystifying_Crypto_pt1.txt2012-10-01 13:35 5.4K 
[TXT]Description_of_the_Rabin_Public_Key_Cryptosystem.txt2012-10-01 13:35 7.7K 
[   ]Detecting Steganographic Content on the Internet.pdf2012-10-01 13:35 819K 
[TXT]DiningCrypt.txt2012-10-01 13:35 33K 
[TXT]Dining_Cryptographers_Problem,_The-Unconditional_Sender_and_Recipient_Untraceability.txt2012-10-01 13:35 33K 
[TXT]DoDPMSP-SDNSStandards.txt2012-10-01 13:35 44K 
[   ]Einführung in die Kryptographie.pdf2012-10-01 13:35 2.8M 
[   ]Elliptic Curves and Cryptography.pdf2012-10-01 13:36 119K 
[TXT]Encrytion_solution,_The.txt2012-10-01 13:36 4.0K 
[   ]Exposing Cryptovirology.pdf2013-07-20 15:32 29M 
[TXT]FIPS-CSSStandard.txt2012-10-01 13:35 121K 
[TXT]FIPS-DES92Renewal.txt2012-10-01 13:35 3.1K 
[TXT]FIPS-DSSDoc.txt2012-10-01 13:35 13K 
[TXT]FIPS-DSSProposedStandard.txt2012-10-01 13:35 27K 
[TXT]FIPS-SHA-SHSInfo.txt2012-10-01 13:35 24K 
[TXT]FIPS-SHA-SHSStandard.txt2012-10-01 13:35 27K 
[TXT]FIPSClipperEES-EFF.txt2012-10-01 13:36 9.2K 
[TXT]FIPSClipperEES.txt2012-10-01 13:35 18K 
[TXT]FIPSClipperEESApproval.txt2012-10-01 13:35 52K 
[TXT]FIPSClipperEESStandard.txt2012-10-01 13:35 19K 
[TXT]FactoringBiblio.txt2012-10-01 13:35 4.6K 
[   ]Factoring Large Numbers with the TWIRL device.pdf2012-10-01 13:36 324K 
[   ]Fishbone Encryption (FRENCH).pdf2012-10-01 13:35 275K 
[TXT]Five_Great_Inventions_of_20th_Century_Cryptography,_The.txt2012-10-01 13:36 24K 
[   ]Foundations of Cryptography.pdf2012-10-01 13:35 1.5M 
[TXT]From_Crossbows_to_Cryptography-Thwarting_the_State_via_Technology.txt2012-10-01 13:36 28K 
[TXT]GAO-OSICryptoTestimony.txt2012-10-01 13:35 21K 
[   ]GPG Crypto From Gnu Manual.pdf2012-10-01 13:35 200K 
[TXT]Getting_the_most_out_of_PGP.txt2012-10-01 13:35 13K 
[   ]Handbook Of Applied Cryptography (old).pdf2012-10-01 13:36 4.6M 
[   ]Handbook Of Applied Cryptography (pdf).zip2012-10-01 13:35 5.2M 
[   ]Handbook Of Applied Cryptography.pdf2012-10-01 13:35 12M 
[DIR]Handbook_of_Applied_Cryptography(1996)/2015-10-04 18:43 -  
[   ]Hankerson, Menezes, Vanstone. Guide to elliptic curve cryptography (Springer, 2004)(ISBN 038795273X)(332s)_CsCr_.pdf2012-10-01 13:35 2.6M 
[   ]High-Speed RSA Implementation.pdf2012-10-01 13:35 498K 
[   ]History_of_Cryptography2012-10-01 13:35 6.0K 
[TXT]How_to_implement_the_DES.txt2012-10-01 13:35 13K 
[TXT]IDEASpeeds.txt2012-10-01 13:35 9.6K 
[TXT]Identifying_and_avoiding_weak_cryptography_products.txt2012-10-01 13:35 30K 
[   ]Informationstheorie Codierung und Kryptographie.pdf2012-10-01 13:35 1.1M 
[   ]IntroToCrypto.pdf2012-10-01 13:35 823K 
[   ]Intro To Cryptography.pdf2012-10-01 13:35 1.1M 
[   ]Intro_to_Use_of_Encryptn-P_Meye2012-10-01 13:35 45K 
[   ]Introduction To Cryptography, An.pdf2012-10-01 13:35 1.1M 
[   ]Introduction To Cryptology, An (pdf+html).zip2012-10-01 13:35 830K 
[   ]Introduction_to_Cryptography2012-10-01 13:36 15K 
[TXT]Introduction_to_Cryptography,_An.txt2012-10-01 13:35 15K 
[TXT]Introduction_to_the_Use_of_Encryption,_An(Meyer,_Peter).txt2012-10-01 13:36 45K 
[   ]Introduction to Cryptography.pdf2012-10-01 13:35 823K 
[TXT]Is_DES_breakable.txt2012-10-01 13:35 11K 
[TXT]IsakmpCiscoAnnounce.txt2012-10-01 13:35 4.0K 
[   ]Key Agreement and Key Transport Using Elliptic Curve Cryptography.pdf2012-10-01 13:35 821K 
[IMG]Koblitz N. A course in number theory and cryptography (2ed., GTM 114, Springer,1994)(600dpi)(L)(T)(123s)_MTc_.djvu2012-10-01 13:35 3.2M 
[IMG]Koblitz N. Algebraic aspects of cryptography (Algorithms and Computation in Mathematics 3. Springer, 1998)(600dpi)(L)(T)(109s)_CsCr_.djvu2012-10-01 13:35 2.4M 
[IMG]Koblitz N. p-adic numbers, p-adic analysis, and zeta-functions (2ed., Springer, 1984)(799dpi)(T)(166s).djvu2012-10-01 13:35 3.7M 
[   ]Kryptographie Grundlagen.pdf2012-10-01 13:35 233K 
[   ]Kryptologie - Eine Einführung.pdf2012-10-01 13:35 1.1M 
[TXT]Ladder-DES-A_Proposed_Candidate_to_Replace_DES.txt2012-10-01 13:35 11K 
[TXT]LadderDES.txt2012-10-01 13:35 11K 
[TXT]LargeDES.txt2012-10-01 13:35 4.1K 
[TXT]Large_Block_DES_Newsletter_v1no1.txt2012-10-01 13:35 4.0K 
[   ]Learn Encryption Techniques.zip2012-10-01 13:35 2.8M 
[   ]Learn Encryption Techniques with BASIC and C++ (html).zip2012-10-01 13:36 3.1M 
[   ]Lecture Notes on Cryptography.pdf2012-10-01 13:35 1.5M 
[IMG]Lomonaco S.J. A quick glance at quantum cryptography (archive_9811056)(T)(54s).djvu2012-10-01 13:35 375K 
[TXT]MD4Alorithm.txt2012-10-01 13:35 30K 
[TXT]MD5Algorithm.txt2012-10-01 13:35 37K 
[TXT]MD5Info.txt2012-10-01 13:35 5.9K 
[TXT]MD5_Message-Digest_Algorithm,_The.txt2012-10-01 13:35 34K 
[   ]MIT PGP Keyserver FAQ2012-10-01 13:35 5.6K 
[TXT]MIT_PGP_Keyserver_FAQ.txt2012-10-01 13:35 5.6K 
[   ]MacPGP 2.7 Guide2012-10-01 13:36 21K 
[   ]MacPGP263_Manual2012-10-01 13:35 0  
[TXT]Merkles-A_Software_Encryption_Function.txt2012-10-01 13:36 81K 
[TXT]NIST-DSSBulletin.txt2012-10-01 13:36 17K 
[TXT]NIST-NSACollusionArticle.txt2012-10-01 13:35 7.3K 
[TXT]NIST-RSA-DSAAnnounce.txt2012-10-01 13:35 7.1K 
[TXT]NISTPubkeyCryptPaper.txt2012-10-01 13:36 330K 
[TXT]NISTvsRSAArticle.txt2012-10-01 13:35 3.8K 
[TXT]NSAAbernathyAnswers.txt2012-10-01 13:36 23K 
[   ]Netsurfer Focus on Cryptography2012-10-01 13:35 40K 
[TXT]Netsurfer_Focus_on_Cryptography_and_Privacy.txt2012-10-01 13:36 40K 
[   ]New Encryption Technologies for Communications Designers.pdf2012-10-01 13:35 8.4M 
[   ]Non-Technical PGP FAQ2012-10-01 13:35 14K 
[TXT]Non-Technical_PGP_FAQ.txt2012-10-01 13:35 14K 
[TXT]NortonWeakness.txt2012-10-01 13:35 8.4K 
[TXT]Nortons_InDiskreet.txt2012-10-01 13:35 8.3K 
[   ]Number Theory An Related Alghoritm In Cryptography.pdf2012-10-01 13:35 250K 
[TXT]Nx2DESFoundWeak.txt2012-10-01 13:36 6.6K 
[TXT]Nx2_DES_Found_Weak.txt2012-10-01 13:35 6.5K 
[   ]PGP 2.6.2 FAQ, Buglist, Fixes,2012-10-01 13:35 13K 
[   ]PGP4dummies2012-10-01 13:35 16K 
[   ]PGP Assignment.doc2012-10-01 13:36 41K 
[TXT]PGPAttackFAQ.txt2012-10-01 13:36 42K 
[   ]PGP DH vs. RSA FAQ v1.52012-10-01 13:35 177K 
[TXT]PGPFAQWithAnswers.txt2012-10-01 13:35 142K 
[TXT]PGPJump.txt2012-10-01 13:36 17K 
[TXT]PGPSafetyPaper.txt2012-10-01 13:35 7.9K 
[TXT]PGP_DH_vs._RSA_FAQ_v1.5.txt2012-10-01 13:35 177K 
[   ]PGP_FAQ2012-10-01 13:35 15K 
[TXT]PGP_for_Absolute_Beginners.txt2012-10-01 13:35 9.1K 
[   ]PGP for Absolute Beginners2012-10-01 13:35 9.1K 
[IMG]Papadakos N.P. Quantum information theory and applications to quantum cryptography (archive_0201057)(T)(46s).djvu2012-10-01 13:35 343K 
[TXT]PassphraseFAQ.txt2012-10-01 13:35 35K 
[TXT]PolygonalSequences.txt2012-10-01 13:36 8.4K 
[   ]Practical Cryptography.pdf2012-10-01 13:35 614K 
[   ]Prentice Hall. Cryptography and Network Security 4th Edition (2005).chm2012-10-01 13:35 12M 
[TXT]PrettyGoodHeroArticle.txt2012-10-01 13:35 20K 
[TXT]PrivacyAnonymityFAQ.txt2012-10-01 13:35 148K 
[TXT]Public-Key Cryptography.txt2012-10-01 13:35 330K 
[TXT]Public-Key_Cryptography-NIST_Special_Publication_800-2.txt2012-10-01 13:35 330K 
[TXT]PublicKeyCryptoisWeak.txt2012-10-01 13:35 12K 
[TXT]PublicKeyInfo.txt2012-10-01 13:35 338K 
[   ]Public Key Systems2012-10-01 13:35 10K 
[TXT]Public_Key_Systems.txt2012-10-01 13:36 10K 
[TXT]Questions_and_Answers_about_MITs_Release_of_PGP_2.6.txt2012-10-01 13:36 15K 
[TXT]Quick_Background_PGP.txt2012-10-01 13:35 16K 
[TXT]Quick_Idea-Speed_of_DES-IDEA_implementations.txt2012-10-01 13:35 9.3K 
[   ]RAS Suggestion to Random Number Generation in Software.pdf2012-10-01 13:35 262K 
[TXT]RSAConfSummary.txt2012-10-01 13:35 6.3K 
[   ]RSA Encryption Algorithm in a Nut Shell.pdf2012-10-01 13:36 392K 
[TXT]RSAFaq.txt2012-10-01 13:35 166K 
[   ]RSA Hardware Implementation.pdf2012-10-01 13:35 279K 
[   ]RSA Laboratories' FAQ - Today's Cryptography (html).zip2012-10-01 13:35 616K 
[   ]RSA Labs FAQ 4.0.pdf2012-10-01 13:35 1.2M 
[TXT]RSANews.txt2012-10-01 13:35 47K 
[TXT]RSAPatentsList.txt2012-10-01 13:35 1.0K 
[TXT]RabinCryptosystem.txt2012-10-01 13:35 7.9K 
[TXT]RandomNumBiblio.txt2012-10-01 13:35 2.2K 
[   ]Rechtsfragen der Kryptographie und der digitalen Signatur.pdf2012-10-01 13:36 120K 
[   ]Report Advanced Cryptography Standard AES.pdf2012-10-01 13:35 383K 
[   ]Rivest-RC5-rev.pdf2012-10-01 13:35 169K 
[TXT]SHSInfo.txt2012-10-01 13:35 24K 
[TXT]Secure_Hash_Standard_(SHS).txt2012-10-01 13:35 24K 
[TXT]Shortcomings_of_AppleShare_Networks.txt2012-10-01 13:36 4.6K 
[TXT]Simple_Data_Encryption_or_digital_electronics_101.txt2012-10-01 13:35 4.5K 
[   ]Stealth_and_Steganography2012-10-01 13:35 2.3K 
[   ]Steganography2012-10-01 13:35 7.8K 
[TXT]Steganography.txt2012-10-01 13:36 7.8K 
[TXT]Strategies_for_Deciphering.txt2012-10-01 13:35 2.7K 
[TXT]Survey_of_Data_Encryption_(theory_DES).txt2012-10-01 13:35 69K 
[TXT]Technical_Information_on_Validated_DES_Devices.txt2012-10-01 13:36 40K 
[TXT]Telnet_Authentication_Option_with_Encryption.txt2012-10-01 13:36 16K 
[TXT]The_CAST-128_Encryption_Algorithm.txt2012-10-01 13:35 37K 
[   ]The_Crypto_Anarchist_Manifesto2012-10-01 13:35 3.7K 
[TXT]The_Cryptography_FAQ.txt2012-10-01 13:35 110K 
[   ]The_Encrytion_solution2012-10-01 13:35 4.0K 
[TXT]Thoughts_on_BBS_authentication.txt2012-10-01 13:35 19K 
[   ]Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems.pdf2012-10-01 13:35 207K 
[TXT]Todays_Cryptography_FAQ.txt2012-10-01 13:35 162K 
[TXT]Trends in Technology and Policy.txt2012-10-01 13:35 63K 
[   ]Twenty Years of Attacks on the RSA Cryptosystem.pdf2012-10-01 13:35 303K 
[   ]Using_the_Keyserver2012-10-01 13:35 6.2K 
[TXT]Using_the_Keyserver.txt2012-10-01 13:35 6.2K 
[TXT]What_is_Cryptography.txt2012-10-01 13:36 15K 
[   ]Why Cryptosystems Fail.pdf2012-10-01 13:35 185K 
[   ]Wiley-Interscience. Information Security Principles and Practice (2005).pdf2012-10-01 13:35 7.6M 
[DIR]Wiley.Applied_Cryptography,2ndEdition(1996)/2015-10-04 18:43 -  
[   ]Wiley. Cryptography for Dummies (2004).chm2012-10-01 13:35 4.0M 
[   ]Wiley_Publishing_-_Cryptography_for_Dummies_[2004].chm2012-10-01 13:35 4.0M 
[TXT]Xbows-CryptographyPaper.txt2012-10-01 13:35 30K 
[TXT]a-crypt.txt2012-10-01 13:35 23K 
[   ]algorithm design manual.hlp2000-03-18 16:06 4.8M 
[TXT]arrl.txt2012-10-01 13:35 19K 
[TXT]atalynx.txt2012-10-01 13:36 9.1K 
[TXT]authenc.txt2012-10-01 13:36 16K 
[   ]blowfish.cry2012-10-01 13:35 30K 
[   ]breaking.des2012-10-01 13:35 11K 
[TXT]chaum_di.txt2012-10-01 13:36 33K 
[TXT]code.txt2012-10-01 13:35 17K 
[   ]crossbow2012-10-01 13:35 28K 
[TXT]cryp.txt2012-10-01 13:35 16K 
[   ]crypt.pri2012-10-01 13:35 15K 
[TXT]crypt.txt2012-10-01 13:35 330K 
[TXT]cryptloj.txt2012-10-01 13:35 12K 
[   ]crypto.dic2012-10-01 13:36 27K 
[   ]crypto.tch2012-10-01 13:35 12K 
[TXT]cryptogr.txt2012-10-01 13:35 63K 
[   ]cryptoma2012-10-01 13:35 3.8K 
[TXT]des.txt2012-10-01 13:35 22K 
[TXT]des_nist.txt2012-10-01 13:35 21K 
[TXT]details_why_RSA_is_broken.txt2012-10-01 13:36 12K 
[TXT]glossary_of_crypto_terms.txt2012-10-01 13:35 27K 
[TXT]ideafast.txt2012-10-01 13:35 9.3K 
[DIR]images/2015-10-04 18:43 -  
[TXT]ladderbl.txt2012-10-01 13:35 4.0K 
[TXT]ladderde.txt2012-10-01 13:36 11K 
[TXT]merkle.txt2012-10-01 13:35 81K 
[   ]ncsatelnpw.hac2012-10-01 13:36 4.6K 
[TXT]nist-cry.txt2012-10-01 13:35 330K 
[TXT]nortons_.txt2012-10-01 13:35 8.3K 
[TXT]polygona.txt2012-10-01 13:36 8.2K 
[TXT]rabin-al.txt2012-10-01 13:35 7.7K 
[TXT]risks_of_teaching_about_computers_and_the_law,_The.txt2012-10-01 13:35 12K 
[TXT]rsaisbro.txt2012-10-01 13:35 12K 
[TXT]sci.crypt.FAQ_pt01.txt2012-10-01 13:36 112K 
[TXT]sci.crypt.FAQ_pt02.txt2012-10-01 13:35 164K 
[TXT]shs_doc.txt2012-10-01 13:35 24K 
[TXT]simpcryp.txt2012-10-01 13:36 4.5K 
[TXT]talonCrypt.txt2012-10-01 13:35 1.9K 
[TXT]techdes.txt2012-10-01 13:35 40K 
[   ]theory.des2012-10-01 13:35 69K 

The Macintosh Archive does not claim rights to any files held herein.
To the best of our knowledge all titles have been discontinued by their publishers.
Rights owners may contact us; All removal requests are taken very seriously.