/Cryptographie/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
Asymétrique/-2017-May-17 20:05
Symétrique/-2018-Sep-19 19:56
EN - A Block-Cipher Mode of Operation for Paral..>195.7 KiB2019-Mar-02 23:57
EN - ASCII Table.gif27.3 KiB2014-Nov-12 11:47
EN - ASN1 key structures in DER and PEM - tls.m..>119.6 KiB2019-Sep-05 16:05
EN - All about side channel attacks - Nicolas C..>593.5 KiB2018-May-27 23:31
EN - Attack on RSA Cryptosystem - Sachin Upadhy..>525.7 KiB2016-Sep-09 14:28
EN - Attacking the Elliptic Curve Discrete Loga..>587.7 KiB2016-Nov-20 18:35
EN - Bézout's Identity - Theorem of the day.pdf183.0 KiB2016-Jun-28 09:54
EN - Bézout's identity - euclidean algorithm.pdf88.5 KiB2009-Mar-03 00:17
EN - Collisions of MD5.pdf651.0 KiB2014-Nov-12 11:47
EN - Cracking PKZIP file's password.pdf16.4 KiB2014-Nov-12 11:47
EN - Differential Power Analysis - Kocher Jaffe..>224.1 KiB2018-Feb-02 23:14
EN - Efficient padding oracle attacks on crypto..>765.3 KiB2014-Nov-12 11:47
EN - Encodings format.pdf66.2 KiB2014-Nov-12 11:47
EN - Finding collisions in the full SHA-1.pdf212.2 KiB2014-Nov-12 11:47
EN - Good practice in PRNG.pdf600.8 KiB2014-Nov-12 11:47
EN - Intel Advanced Encryption Standard (AES) N..>322.8 KiB2019-Mar-02 23:57
EN - LFSR-based Stream Ciphers - Anne Canteaut.pdf676.6 KiB2016-Jan-04 11:41
EN - Linear Feedback Shift Registers (LFSR) - A..>36.3 KiB2004-Oct-11 18:46
EN - NIST FIPS 140-1.pdf389.5 KiB2014-Nov-12 11:47
EN - NIST FIPS 140-2.pdf1.4 MiB2014-Nov-12 11:47
EN - NIST FIPS 180-2 SHA.pdf211.0 KiB2014-Nov-12 11:47
EN - NIST FIPS 202 SHA-3.pdf1.4 MiB2015-Aug-04 16:34
EN - NIST Pseudo Random Number Generators for c..>589.8 KiB2014-Nov-12 11:47
EN - NIST Security requirements for cryptograph..>283.5 KiB2014-Nov-12 11:47
EN - NIST crypto key management framework.pdf557.4 KiB2014-Nov-12 11:47
EN - NIST cryptographic toolkit.pdf61.1 KiB2014-Nov-12 11:47
EN - NIST review of counter mode encryption.pdf60.2 KiB2014-Nov-12 11:47
EN - NIST statistical test suite for random and..>6.4 MiB2014-Nov-12 11:47
EN - NIST.FIPS.186-4 Digital Signature Standard..>743.1 KiB2019-Sep-22 10:23
EN - New Partial Key Exposure Attacks on RSA - ..>200.9 KiB2007-Sep-02 01:42
EN - On White-Box Cryptography - Marc Joye.pdf147.0 KiB2015-Sep-05 00:43
EN - Padding oracle attacks on the ISO CBC mode..>224.4 KiB2014-Nov-12 11:47
EN - Partial Key Exposure AttackOn Low-Exponent..>138.9 KiB2015-Aug-21 20:04
EN - Pohlig-Hellman Applied in Elliptic Curve C..>177.5 KiB2016-Oct-31 11:50
EN - Practical Padding oracle attacks.pdf303.0 KiB2014-Nov-12 11:47
EN - Pseudo Random Number Generators for crypto..>589.8 KiB2014-Nov-12 11:47
EN - Randomness Attack Against PHP Apps.pdf459.3 KiB2020-Jul-15 09:20
EN - SANS Institute AES CBC Bit Flipping.pdf3.0 MiB2018-Jun-22 20:10
EN - Security flaws induced by CBC padding.pdf125.6 KiB2014-Nov-12 11:47
EN - The 9 Lives of Bleichenbacher’s CAT - Ro..>482.6 KiB2020-Mar-09 19:48
EN - The Insecurity of The Elliptic Curve Digit..>3.4 MiB2019-Jul-30 17:30
EN - The discrete logarithm problem.pdf414.8 KiB2014-Nov-12 11:47
EN - Twenty Years of Attacks on the RSA Cryptos..>303.4 KiB2010-Jun-04 21:24
EN - rootmedict.txt.bz2400.5 KiB2016-Apr-24 11:25
FR - Attaques par collision contre SHA-1.pdf613.8 KiB2014-Nov-12 11:47
FR - Courbes elliptiques.pdf245.4 KiB2016-Sep-10 11:21
FR - Cryptanalyse de RSA.pdf411.8 KiB2009-Jun-28 12:58
FR - Cryptographie en boîte blanche - cacher d..>365.7 KiB2019-Jul-17 19:31
FR - Introduction à la cryptographie - HSC.pdf576.2 KiB2014-Nov-12 11:47
FR - PGCD PGCM - Théorèmes de Bézout et de G..>92.8 KiB2016-Jul-15 10:13
FR - Principes de LFSR - Univ Lille 1.pdf222.7 KiB2011-Mar-31 07:04
FR - Registre à décalage à rétroaction linÃ..>447.5 KiB2015-Sep-17 20:39
FR - SSTIC 04 compromis temps mémoire.pdf166.4 KiB2014-Nov-12 11:47
FR - SSTIC 07 confidentialite et cryptographie ..>248.9 KiB2014-Nov-12 11:47
FR - SSTIC 08 cryptographie attaques tous azimu..>5.6 MiB2014-Nov-12 11:47