Exetools  

Go Back   Exetools > General > General Discussion

Notices

Reply
 
Thread Tools Display Modes
  #1  
Old 09-22-2005, 04:46
Unforgiv3N's Avatar
Unforgiv3N Unforgiv3N is offline
Friend
 
Join Date: Aug 2005
Posts: 172
Rept. Given: 0
Rept. Rcvd 0 Times in 0 Posts
Thanks Given: 0
Thanks Rcvd at 3 Times in 3 Posts
Unforgiv3N Reputation: 0
Code Breakers - Tons of E-Books

Code:
http://www.madchat.org/crypto/codebreakers/
Code:
[txt] 013.pdf                          23-Jul-2004 13:04    57k  Cryptanalysis of a Provably Secure Cryptographic Hash Function
[txt] 015-samyde_french.pdf            30-Jun-2004 10:14    63k  Cryptanalyse par side channel
[txt] 016-samyde_english.pdf           23-Jul-2004 13:04    59k  Side channel cryptanalysis
[txt] 044.pdf                          23-Jul-2004 13:04   312k  Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
[txt] 109.pdf                          23-Jul-2004 13:05   240k  Cryptanalysis of SAFER++
[txt] 125.pdf                          23-Jul-2004 13:05   229k  Algebraic Attacks on Combiners with Memory and Several Outputs
[txt] 135.pdf                          23-Jul-2004 13:05   127k  Collision Attack on Reduced Round Camellia
[txt] 142.pdf                          26-Jul-2004 12:11   153k  On the Applicability of Distinguishing Attacks Against Stream Ciphers
[txt] 152.pdf                          25-Jul-2004 12:58   135k  A note on Weak Keys of PES, IDEA and some Extended Variants
[txt] 31-tkohno.pdf                    23-Jul-2004 13:05   224k  Preliminary Cryptanalysis of Reduced-Round Serpent
[txt] 35-ebiham.pdf                    08-Jul-2004 22:19   179k  Cryptanalysis of Reduced Variants of Rijndael
[txt] 36-tshimoyama.pdf                27-Jul-2004 11:01   196k  Correlation Attack to the Block Cipher RC5 and the Simplified Variants of RC6
[txt] 418pdf.pdf                       05-Jul-2004 13:54   125k  Trojan Horse Attacking Strategy on Quantum Cryptography
[txt] 752.pdf                          27-Jul-2004 11:02   662k  Basic Cryptanalysis Techniques 
[txt] AttackTranspositionICEST2003.pdf 27-Jul-2004 11:02   268k  Attacks on the Transposition Ciphers Using Optimization Heuristics
[txt] BauerCryptanalysis.pdf           23-Jul-2004 13:05    96k  Cryptanalysis
[txt] CS0910.revised.pdf               29-Aug-2004 12:11   197k  Differential Fault Analysis of Secret Key Cryptosystems
[txt] CS0928.pdf                       29-Aug-2004 12:11   177k  Cryptanalysis of the ANSI X9.52 CDCM Mode
[txt] Crypto94.pdf                     23-Jul-2004 13:06   230k  Linear Cryptanalysis Using Multiple Approximations
[txt] DFT2002_Paper.pdf                27-Jul-2004 10:52   207k  Fault-Based Side-Channel Cryptanalysis Tolerant Rijndael Symmetric Block Cipher Architecture
[txt] Dobbertin_MD4.pdf                08-Jul-2004 22:19   159k  Cryptanalysis of MD4
[txt] Eurocrypt96.pdf                  23-Jul-2004 13:06   249k  Non-Linear Approximations in Linear Cryptanalysis
[txt] HG97chis.pdf                     24-Jul-2004 08:49   127k  Cryptanalysis of the SEAL Encryption Algorithm
[txt] Han99abs.pdf                     30-Jun-2004 10:15    62k  Cryptanalyse et sécurité des algorithmes à clé secrète
[txt] JournalHeysTavares.pdf           27-Jul-2004 11:02   176k  Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis
[txt] NitNat.pdf                       26-Jul-2004 12:49   335k  Cracking the NitNat Cipher
[txt] RSA-survey.pdf                   05-Jul-2004 13:55   303k  Twenty Years of Attacks on RSA Cryptosystem
[txt] ShortSecretExponents.pdf         08-Jul-2004 22:20   119k  Cryptanalysis of Short RSA Secret Exponents
[txt] SubstGen.pdf                     27-Jul-2004 11:21    79k  Solving Substitution Ciphers with Genetics Algorithm
[txt] TalkSummerschool.pdf             08-Jul-2004 22:20   161k  Stream Cipher Cryptanalysis - Algebraic Attacks
[txt] TriStrata.pdf                    27-Jul-2004 11:21   133k  Security Weaknesses in a Randomized Stream Cipher
[txt] TwokeytripleDES.pdf              27-Jul-2004 11:21    58k  Encryption and security: the Data Encryption Standard
[txt] WuHongjun_2002_23840169.pdf      27-Jul-2004 11:03   121k  Cryptanalysis of Stream Cipher Alpha1
[txt] WuHongjun_2002_25130447.pdf      27-Jul-2004 11:03    92k  Related-Cipher Attacks
[txt] Y_23_rc4_cryptana.pdf            27-Jul-2004 11:04   200k  Cryptanalysis of RC4-like Ciphers
[txt] andreas3.pdf                     27-Jul-2004 11:25   2.3M  How secure is a cipher?
[txt] codebook_solution.pdf            05-Jul-2004 13:56   325k  How we Cracked the Code Book Ciphers
[txt] correlation.pdf                  29-Aug-2004 12:11   140k  Searching for the Optimum Correlation Attack
[txt] cryptanalysis.pdf                08-Jul-2004 22:20   147k  A Self-Study Course in Block-Cipher Cryptanalysis
[txt] cs753.pdf                        15-Sep-2004 19:41   227k  New Types of Cryptanalytic Attacks Using Related Keys
[txt] cs782.pdf                        15-Sep-2004 19:42   213k  Differential Cryptanalysis of Lucifer 
[txt] cs813.pdf                        15-Sep-2004 19:42   188k  On Matsui's Linear Cryptanalysis 
[txt] cs817.pdf                        15-Sep-2004 19:43   166k  An Improvement of Davies' Attack on DES
[txt] cs833.pdf                        15-Sep-2004 19:43   186k  Cryptanalysis of Multiple Modes of Operation 
[txt] cs842.pdf                        15-Sep-2004 19:44   173k  A Known Plaintext Attack on the PKZIP Stream Cipher
[txt] cs885.pdf                        15-Sep-2004 19:45   261k  Cryptanalysis of Triple Modes of Operation
[txt] drm1.pdf                         25-Jul-2004 13:47   162k  Attacking an obfuscated cipher by injecting faults 
[txt] extwp3-001-2.pdf                 27-Jul-2004 11:07    81k  Cryptanalysis of LILI-128
[txt] fmirza-report.pdf                24-Jul-2004 08:43   241k  Block Ciphers And Cryptanalysis
[txt] frogAES2pub.pdf                  24-Jul-2004 13:20   195k  Cryptanalysis of FROG
[txt] fse98.pdf                        29-Aug-2004 12:11   190k  Differential Cryptanalysis of the ICE Encrypting Algorithm
[txt] heurlang.pdf                     27-Jul-2004 11:25    34k  Heuristic Language Analysis: Techniques and Applications
[txt] icrijndael.pdf                   27-Jul-2004 11:07   204k  Improved Cryptanalysis of Rijndael
[txt] idea.pdf                         29-Aug-2004 12:11   191k  The Block Cipher IDEA
[txt] initial_securid_analysis.pdf     24-Jul-2004 08:54   129k  Initial Cryptanalysis of the RSA SecurID Algorithm
[txt] keliherPhD.pdf                   27-Jul-2004 11:08   714k  Linear Cryptanalysis of Substitution-Permutation Networks
[txt] keysched-crypto96.pdf            29-Aug-2004 12:12   220k  Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
[txt] keysched-icics97.pdf             29-Aug-2004 12:12   218k  Related-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA
[txt] loki97.pdf                       29-Aug-2004 12:12    87k  Weaknesses in LOKI97
[TXT] md5-cryptanalysis.txt            24-Jul-2004 11:35     6k  Analysis and Design of Cryptographic Hash Functions 
[txt] mmthesis-side-channel.pdf        27-Jul-2004 11:09   816k  Techniques of Side Channel Cryptanalysis
[txt] muxfsr.pdf                       29-Aug-2004 12:12   134k  A Faster Attack on Certain Stream Ciphers
[txt] natarara.pdf                     24-Jul-2004 08:43   151k  Differential CryptAnalysis
[txt] paper-design-vulnerabilities.pdf 25-Jul-2004 13:59   108k  Cryptographic Design Vulnerabilities
[txt] provsec.pdf                      29-Aug-2004 12:42   145k  Weak Keys
[txt] pseudorandom_number.pdf          25-Jul-2004 14:03   219k  Cryptanalytic Attacks on Pseudorandom Number Generators
[txt] rc5.pdf                          29-Aug-2004 12:12   202k  Improved Differential Attacks on RC5
[txt] rc5diff.pdf                      29-Aug-2004 12:42   153k  
[txt] repetition_codes.pdf             27-Jul-2004 11:27    68k  Breaking Block Ciphers using Repetition Codes
[TXT] rsa.txt                          24-Jul-2004 11:35     6k  RSA: Attacking the cryptosystem 
[txt] sshtiming.pdf                    25-Jul-2004 14:20   317k  Timing Analysis of Keystrokes and Timing Attacks on SSH
[txt] ssl-timing.pdf                   05-Jul-2004 13:56   144k  Remote Timing Attacks are Practical
[txt] trunc_dif_saf.pdf                29-Aug-2004 12:13   184k  Truncated Differentials of SAFER
Reply With Quote
  #2  
Old 09-22-2005, 07:51
duseng duseng is offline
Friend
 
Join Date: Feb 2004
Posts: 120
Rept. Given: 9
Rept. Rcvd 0 Times in 0 Posts
Thanks Given: 1
Thanks Rcvd at 2 Times in 2 Posts
duseng Reputation: 0
i think you should posted your e-book here : http://www.exetools.com/forum/showthread.php?t=3440&goto=lastpost
Reply With Quote
  #3  
Old 09-22-2005, 17:26
Shub-Nigurrath's Avatar
Shub-Nigurrath Shub-Nigurrath is offline
VIP
 
Join Date: Mar 2004
Location: Obscure Kadath
Posts: 919
Rept. Given: 60
Rept. Rcvd 419 Times in 94 Posts
Thanks Given: 68
Thanks Rcvd at 328 Times in 100 Posts
Shub-Nigurrath Reputation: 400-499 Shub-Nigurrath Reputation: 400-499 Shub-Nigurrath Reputation: 400-499 Shub-Nigurrath Reputation: 400-499 Shub-Nigurrath Reputation: 400-499
technically speaking these are papers and not ebooks..
__________________
Ŝħůb-Ňìĝùŕřaŧħ ₪)
There are only 10 types of people in the world: Those who understand binary, and those who don't
http://www.accessroot.com
Reply With Quote
  #4  
Old 09-22-2005, 22:41
Sky Sky is offline
Friend
 
Join Date: Aug 2004
Posts: 69
Rept. Given: 3
Rept. Rcvd 3 Times in 2 Posts
Thanks Given: 6
Thanks Rcvd at 15 Times in 11 Posts
Sky Reputation: 3
Quote:
Originally Posted by Shub-Nigurrath
technically speaking these are papers and not ebooks..
IBM RedBooks also in pdf format.
Reply With Quote
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



All times are GMT +8. The time now is 18:07.


Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX, chessgod101
( 1998 - 2024 )