#1
|
||||
|
||||
Code Breakers - Tons of E-Books
Code:
http://www.madchat.org/crypto/codebreakers/ Code:
[txt] 013.pdf 23-Jul-2004 13:04 57k Cryptanalysis of a Provably Secure Cryptographic Hash Function [txt] 015-samyde_french.pdf 30-Jun-2004 10:14 63k Cryptanalyse par side channel [txt] 016-samyde_english.pdf 23-Jul-2004 13:04 59k Side channel cryptanalysis [txt] 044.pdf 23-Jul-2004 13:04 312k Cryptanalysis of Block Ciphers with Overdefined Systems of Equations [txt] 109.pdf 23-Jul-2004 13:05 240k Cryptanalysis of SAFER++ [txt] 125.pdf 23-Jul-2004 13:05 229k Algebraic Attacks on Combiners with Memory and Several Outputs [txt] 135.pdf 23-Jul-2004 13:05 127k Collision Attack on Reduced Round Camellia [txt] 142.pdf 26-Jul-2004 12:11 153k On the Applicability of Distinguishing Attacks Against Stream Ciphers [txt] 152.pdf 25-Jul-2004 12:58 135k A note on Weak Keys of PES, IDEA and some Extended Variants [txt] 31-tkohno.pdf 23-Jul-2004 13:05 224k Preliminary Cryptanalysis of Reduced-Round Serpent [txt] 35-ebiham.pdf 08-Jul-2004 22:19 179k Cryptanalysis of Reduced Variants of Rijndael [txt] 36-tshimoyama.pdf 27-Jul-2004 11:01 196k Correlation Attack to the Block Cipher RC5 and the Simplified Variants of RC6 [txt] 418pdf.pdf 05-Jul-2004 13:54 125k Trojan Horse Attacking Strategy on Quantum Cryptography [txt] 752.pdf 27-Jul-2004 11:02 662k Basic Cryptanalysis Techniques [txt] AttackTranspositionICEST2003.pdf 27-Jul-2004 11:02 268k Attacks on the Transposition Ciphers Using Optimization Heuristics [txt] BauerCryptanalysis.pdf 23-Jul-2004 13:05 96k Cryptanalysis [txt] CS0910.revised.pdf 29-Aug-2004 12:11 197k Differential Fault Analysis of Secret Key Cryptosystems [txt] CS0928.pdf 29-Aug-2004 12:11 177k Cryptanalysis of the ANSI X9.52 CDCM Mode [txt] Crypto94.pdf 23-Jul-2004 13:06 230k Linear Cryptanalysis Using Multiple Approximations [txt] DFT2002_Paper.pdf 27-Jul-2004 10:52 207k Fault-Based Side-Channel Cryptanalysis Tolerant Rijndael Symmetric Block Cipher Architecture [txt] Dobbertin_MD4.pdf 08-Jul-2004 22:19 159k Cryptanalysis of MD4 [txt] Eurocrypt96.pdf 23-Jul-2004 13:06 249k Non-Linear Approximations in Linear Cryptanalysis [txt] HG97chis.pdf 24-Jul-2004 08:49 127k Cryptanalysis of the SEAL Encryption Algorithm [txt] Han99abs.pdf 30-Jun-2004 10:15 62k Cryptanalyse et sécurité des algorithmes à clé secrète [txt] JournalHeysTavares.pdf 27-Jul-2004 11:02 176k Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis [txt] NitNat.pdf 26-Jul-2004 12:49 335k Cracking the NitNat Cipher [txt] RSA-survey.pdf 05-Jul-2004 13:55 303k Twenty Years of Attacks on RSA Cryptosystem [txt] ShortSecretExponents.pdf 08-Jul-2004 22:20 119k Cryptanalysis of Short RSA Secret Exponents [txt] SubstGen.pdf 27-Jul-2004 11:21 79k Solving Substitution Ciphers with Genetics Algorithm [txt] TalkSummerschool.pdf 08-Jul-2004 22:20 161k Stream Cipher Cryptanalysis - Algebraic Attacks [txt] TriStrata.pdf 27-Jul-2004 11:21 133k Security Weaknesses in a Randomized Stream Cipher [txt] TwokeytripleDES.pdf 27-Jul-2004 11:21 58k Encryption and security: the Data Encryption Standard [txt] WuHongjun_2002_23840169.pdf 27-Jul-2004 11:03 121k Cryptanalysis of Stream Cipher Alpha1 [txt] WuHongjun_2002_25130447.pdf 27-Jul-2004 11:03 92k Related-Cipher Attacks [txt] Y_23_rc4_cryptana.pdf 27-Jul-2004 11:04 200k Cryptanalysis of RC4-like Ciphers [txt] andreas3.pdf 27-Jul-2004 11:25 2.3M How secure is a cipher? [txt] codebook_solution.pdf 05-Jul-2004 13:56 325k How we Cracked the Code Book Ciphers [txt] correlation.pdf 29-Aug-2004 12:11 140k Searching for the Optimum Correlation Attack [txt] cryptanalysis.pdf 08-Jul-2004 22:20 147k A Self-Study Course in Block-Cipher Cryptanalysis [txt] cs753.pdf 15-Sep-2004 19:41 227k New Types of Cryptanalytic Attacks Using Related Keys [txt] cs782.pdf 15-Sep-2004 19:42 213k Differential Cryptanalysis of Lucifer [txt] cs813.pdf 15-Sep-2004 19:42 188k On Matsui's Linear Cryptanalysis [txt] cs817.pdf 15-Sep-2004 19:43 166k An Improvement of Davies' Attack on DES [txt] cs833.pdf 15-Sep-2004 19:43 186k Cryptanalysis of Multiple Modes of Operation [txt] cs842.pdf 15-Sep-2004 19:44 173k A Known Plaintext Attack on the PKZIP Stream Cipher [txt] cs885.pdf 15-Sep-2004 19:45 261k Cryptanalysis of Triple Modes of Operation [txt] drm1.pdf 25-Jul-2004 13:47 162k Attacking an obfuscated cipher by injecting faults [txt] extwp3-001-2.pdf 27-Jul-2004 11:07 81k Cryptanalysis of LILI-128 [txt] fmirza-report.pdf 24-Jul-2004 08:43 241k Block Ciphers And Cryptanalysis [txt] frogAES2pub.pdf 24-Jul-2004 13:20 195k Cryptanalysis of FROG [txt] fse98.pdf 29-Aug-2004 12:11 190k Differential Cryptanalysis of the ICE Encrypting Algorithm [txt] heurlang.pdf 27-Jul-2004 11:25 34k Heuristic Language Analysis: Techniques and Applications [txt] icrijndael.pdf 27-Jul-2004 11:07 204k Improved Cryptanalysis of Rijndael [txt] idea.pdf 29-Aug-2004 12:11 191k The Block Cipher IDEA [txt] initial_securid_analysis.pdf 24-Jul-2004 08:54 129k Initial Cryptanalysis of the RSA SecurID Algorithm [txt] keliherPhD.pdf 27-Jul-2004 11:08 714k Linear Cryptanalysis of Substitution-Permutation Networks [txt] keysched-crypto96.pdf 29-Aug-2004 12:12 220k Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES [txt] keysched-icics97.pdf 29-Aug-2004 12:12 218k Related-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA [txt] loki97.pdf 29-Aug-2004 12:12 87k Weaknesses in LOKI97 [TXT] md5-cryptanalysis.txt 24-Jul-2004 11:35 6k Analysis and Design of Cryptographic Hash Functions [txt] mmthesis-side-channel.pdf 27-Jul-2004 11:09 816k Techniques of Side Channel Cryptanalysis [txt] muxfsr.pdf 29-Aug-2004 12:12 134k A Faster Attack on Certain Stream Ciphers [txt] natarara.pdf 24-Jul-2004 08:43 151k Differential CryptAnalysis [txt] paper-design-vulnerabilities.pdf 25-Jul-2004 13:59 108k Cryptographic Design Vulnerabilities [txt] provsec.pdf 29-Aug-2004 12:42 145k Weak Keys [txt] pseudorandom_number.pdf 25-Jul-2004 14:03 219k Cryptanalytic Attacks on Pseudorandom Number Generators [txt] rc5.pdf 29-Aug-2004 12:12 202k Improved Differential Attacks on RC5 [txt] rc5diff.pdf 29-Aug-2004 12:42 153k [txt] repetition_codes.pdf 27-Jul-2004 11:27 68k Breaking Block Ciphers using Repetition Codes [TXT] rsa.txt 24-Jul-2004 11:35 6k RSA: Attacking the cryptosystem [txt] sshtiming.pdf 25-Jul-2004 14:20 317k Timing Analysis of Keystrokes and Timing Attacks on SSH [txt] ssl-timing.pdf 05-Jul-2004 13:56 144k Remote Timing Attacks are Practical [txt] trunc_dif_saf.pdf 29-Aug-2004 12:13 184k Truncated Differentials of SAFER |
#2
|
|||
|
|||
i think you should posted your e-book here : http://www.exetools.com/forum/showthread.php?t=3440&goto=lastpost
|
#3
|
||||
|
||||
technically speaking these are papers and not ebooks..
__________________
Ŝħůb-Ňìĝùŕřaŧħ ₪) There are only 10 types of people in the world: Those who understand binary, and those who don't http://www.accessroot.com |
#4
|
|||
|
|||
Quote:
|
Thread Tools | |
Display Modes | |
|
|