Downloads

Name Date Author Size DL's Rating Get
XOR Encrypting 27 May 2013 : 11:13 E33 477.67kB 808
0/5 : Not rated
White-Box Cryptography and SPN Ciphers. LRC Method 06 Jun 2011 : 08:23 Schelkunov D., Ph.D. 7.89MB 400
0/5 : Not rated
White-box Attack Resistant Cryptography 26 Jul 2014 : 05:36 Dušan Klinec 970.08kB 410
0/5 : Not rated
Verifying Curve25519 Software 29 Apr 2015 : 06:25 Yu-Fang Chen, Chang-Hong Hsu, Hsin-Hung Lin, Peter Schwabe, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Ya 391.12kB 438
0/5 : Not rated
Tweakable Block Ciphers 11 Sep 2006 : 13:58 Moses Liskov 157.22kB 824
0/5 : Not rated
Tropical Cryptography 25 Dec 2012 : 13:19 Dima Grigoriev, Vladimir Shpilrain 150.32kB 422
0/5 : Not rated
The Rijndael Block Cipher 02 Sep 2006 : 11:02 Joan Daemen 215.18kB 1145
0/5 : Not rated
The Laws of Cryptography with Java Code 02 Sep 2006 : 10:56 Neal R. Wagner 888.25kB 1199
0/5 : Not rated
Taming the XOR Encryption 15 Mar 2007 : 12:21 Fornix 3,565B 1144
0/5 : Not rated
Stronger Key Derivation via Sequential Memory-Hard Functions 11 Jul 2011 : 12:54 Colin Percival 183.01kB 343
0/5 : Not rated
RSA - Studying and Reversing 11 Sep 2006 : 13:52 Evilcry 21.92kB 1722
0/5 : Not rated
Reversing CRC - Theory and Practice 06 Apr 2007 : 14:29 Martin Stigge 473.14kB 2496
0/5 : Not rated
Reverse Engineering of Strong Crypto Signatures Schemes (ECC) 05 Jan 2008 : 12:12 EvilCry 72.42kB 1240
0/5 : Not rated
Product Keys Based on the Advanced Encryption Standard (AES) 21 Jun 2007 : 11:43 Jeffrey Walton 1.05MB 1229
0/5 : Not rated
Product Keys Based on Elliptic Curve Cryptography 21 Jun 2007 : 07:31 Jeffrey Walton 1.54MB 1448
0/5 : Not rated
Password Based Cryptography 02 Sep 2006 : 10:47 Adam Berent 220.02kB 1309
0/5 : Not rated
On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks 11 Sep 2011 : 12:34 [ Various Authors ] 2.10MB 418
0/5 : Not rated
OCC Checksum Checking 02 Sep 2006 : 10:46 Archphase 4.24kB 965
0/5 : Not rated
Non-Black-Box Techniques in Cryptography 28 Aug 2010 : 16:55 Boaz Barak 1.10MB 464
0/5 : Not rated
Methods of Symmetric Cryptanalysis 11 Sep 2011 : 12:20 Dmitry Khovratovich 783.59kB 428
0/5 : Not rated
MD5 Collisions on GPU's 30 Jul 2009 : 11:18 Marc Bevand 104.86kB 621
0/5 : Not rated
Lightweight Cryptographic Algorithms 22 Jan 2012 : 10:56 Jorge Nakahara Jr 474.04kB 467
0/5 : Not rated
Key Iterations & Crypto Salts 02 Sep 2006 : 10:38 Adam Berent 35.47kB 984
0/5 : Not rated
Introduction to Block Cipher Algorithms 02 Sep 2006 : 10:01 Jason Isom 89.15kB 1055
0/5 : Not rated
In the Blink of an Eye: There Goes Your AES Key 18 Jun 2012 : 13:59 Sergei Skorobogatov 909.87kB 499
0/5 : Not rated
Improved Cryptanalysis of Rijndael 02 Sep 2006 : 10:33 Niels Ferguson 178.28kB 1044
0/5 : Not rated
How to Break MD5 and Other Hash Functions 02 Sep 2006 : 10:29 Xiaoyun Wang 157.18kB 2686
0/5 : Not rated
How Safe is Your Security Software? 02 Sep 2006 : 10:25 Adam Berent 32.09kB 1009
0/5 : Not rated
Hidden Field Equations Public Key Crypto System 21 Jun 2007 : 11:50 Nicolas Tadeusz. Courtois 170.35kB 778
0/5 : Not rated
Hardening Registration Protection Schemes 11 Sep 2006 : 13:40 Thorsten Schneider 619.10kB 1362
0/5 : Not rated
Return to Category List 29357 download(s) from 30 files