Un jour j'ai arrete de bosser...
et ma tete s'est remise a marcher.
--Anita Bomba
Icon Name Last modified Size Description

[FOLDER] Parent Directory   - Agonizing Memories
[DIR]archives18-Jul-2010 00:15 -  
[DIR]00-cnam-cryptographie.pdf03-Feb-2009 20:31199.47Kanalysis algo stegano wordlists
[DIR]007.pdf03-Feb-2009 20:31142.67K 
[DIR]013-jgl.pdf03-Feb-2009 20:31272.30K 
[DIR]0501038.pdf03-Feb-2009 20:31105.31K 
[DIR]061.pdf03-Feb-2009 20:3170.33K 
[DIR]075.pdf03-Feb-2009 20:31126.91K 
[DIR]0764541889.pdf03-Feb-2009 20:31241.14K 
[DIR]126.pdf03-Feb-2009 20:31336.95K 
[DIR]144.pdf03-Feb-2009 20:3180.65K 
[DIR]147.pdf03-Feb-2009 20:31314.35K 
[DIR]148.pdf03-Feb-2009 20:31245.21K 
[DIR]199.pdf03-Feb-2009 20:3156.14K 
[DIR]1995meadows-asiacrypt94.pdf03-Feb-2009 20:31134.47K 
[DIR]2001_goodman_jssc.pdf03-Feb-2009 20:31440.08K 
[DIR]2002_HDRThesis-US.pdf03-Feb-2009 20:311.66M 
[DIR]2004_sac_A4.pdf03-Feb-2009 20:31206.96K 
[DIR]20thCenturyCryptoSpeech.txt03-Feb-2009 20:3125.11K 
[DIR]4.pdf03-Feb-2009 20:31465.58K 
[DIR]AB-9800.pdf03-Feb-2009 20:31232.70K 
[DIR]AES_Algorithm_Efficiency.html03-Feb-2009 20:3171.76KAES Algorithm Efficiency
[DIR]AFP-crypto-liberee.html03-Feb-2009 20:312.00Kanalysis algo stegano wordlists
[DIR]AGPS_01OCFB-paper.pdf03-Feb-2009 20:31279.04K 
[DIR]BRICS-RS-94-38.pdf03-Feb-2009 20:31292.86K 
[DIR]CHJ_02ge.pdf03-Feb-2009 20:31275.08K 
[DIR]CSE-97-15.pdf03-Feb-2009 20:31465.54K 
[DIR]Chap_07.pdf03-Feb-2009 20:31166.70K 
[DIR]Cryptography-1.pdf03-Feb-2009 20:3172.99K 
[DIR]Cryptography-3.pdf03-Feb-2009 20:3172.26K 
[DIR]CypherpunkManifesto.txt03-Feb-2009 20:315.18K 
[DIR]DPA.pdf03-Feb-2009 20:31217.32K 
[DIR]FeteSc.pdf03-Feb-2009 20:31160.38K 
[DIR]Grund_Symmetric-Cryptography_Paper.pdf03-Feb-2009 20:31366.84K 
[DIR]HAVAL_paper.pdf03-Feb-2009 20:31268.11K 
[DIR]I22Diff.pdf03-Feb-2009 20:317.89K 
[DIR]I2_cryptologie.pdf03-Feb-2009 20:3163.83Kanalysis algo stegano wordlists
[DIR]IC_TECH_REPORT_199938.pdf03-Feb-2009 20:31182.95K 
[DIR]IDEA_0304.pdf03-Feb-2009 20:31307.63K 
[DIR]IntroCrypto_fr.pdf03-Feb-2009 20:312.78MTutorials vx en francais
[DIR]LeeShiYinRivestRobshaw-OnPermutationOperationsInCipherDesign.pdf03-Feb-2009 20:31115.43K 
[DIR]LinuxChiffrement.pdf03-Feb-2009 20:31398.72K 
[DIR]NMWd95ca.pdf03-Feb-2009 20:31104.86K 
[DIR]NT.pdf03-Feb-2009 20:31240.45K 
[DIR]Nac95abs.pdf03-Feb-2009 20:3186.89K 
[DIR]NewsKeyRecoverySVV10.pdf03-Mar-2011 13:10931.64K 
[DIR]PB-472.pdf03-Feb-2009 20:31157.12K 
[DIR]Part_III.pdf03-Feb-2009 20:31520.34K 
[DIR]QC.pdf03-Feb-2009 20:311.80M 
[DIR]RHUL-MA-2001-5.pdf03-Feb-2009 20:31500.60K 
[DIR]RSA02.pdf03-Feb-2009 20:31854.55K 
[DIR]RSA_hardware_implementation.pdf03-Feb-2009 20:31279.13K 
[DIR]RabinCryptosystem.txt03-Feb-2009 20:318.21K 
[DIR]RivestKaliski-RSAProblem.pdf03-Feb-2009 20:3197.18K 
[DIR]SaveVig.pdf03-Feb-2009 20:31476.28K 
[DIR]Simplecrypto.pdf03-Feb-2009 20:3141.63K 
[DIR]SubstGen.pdf03-Feb-2009 20:3179.18K 
[DIR]SurveyAsynchExt.pdf03-Feb-2009 20:31148.82K 
[DIR]The_simple_ideal_cipher_system.pdf03-Feb-2009 20:31103.63K 
[DIR]TuringPres.pdf03-Feb-2009 20:31270.34K 
[DIR]UserAuth.pdf03-Feb-2009 20:31390.47K 
[DIR]Wits00.pdf03-Feb-2009 20:3129.15K 
[DIR]aes-crypto.pdf03-Feb-2009 20:31303.87Kanalysis algo stegano wordlists
[DIR]alibaba.pdf03-Feb-2009 20:31226.79K 
[DIR]andreas3.pdf03-Feb-2009 20:312.30M 
[DIR]arit.pdf03-Feb-2009 20:31202.17K 
[DIR]bear-lion.pdf03-Feb-2009 20:31152.08K 
[DIR]bit_order.pdf03-Feb-2009 20:3165.72K 
[DIR]bsa-final-report.txt03-Feb-2009 20:3128.89K 
[DIR]c.pdf03-Feb-2009 20:3198.65K 
[DIR]cbtwirl.pdf03-Feb-2009 20:31118.33K 
[DIR]cfs.pdf03-Feb-2009 20:3182.48K 
[DIR]cfskey.pdf03-Feb-2009 20:3141.71K 
[DIR]chaffing-and-winnowing.txt03-Feb-2009 20:3125.08K 
[DIR]ches99.pdf03-Feb-2009 20:31181.34K 
[DIR]cmc.pdf03-Feb-2009 20:31750.05K 
[DIR]cocaine-auction-protocol.pdf03-Feb-2009 20:31226.82K 
[DIR]code.pdf03-Feb-2009 20:31197.88K[VM] Explication du code de VM du Linux 2.4
[DIR]concours_aes.pdf03-Feb-2009 20:31470.52KAnalyse des algorithmes finalistes concourant pour le futur standard AES
[DIR]crypt.talk.pdf03-Feb-2009 20:31100.00K 
[DIR]crypto.pdf03-Feb-2009 20:31216.83Kanalysis algo stegano wordlists
[DIR]crypto_mod.pdf03-Feb-2009 20:31173.38Kanalysis algo stegano wordlists
[DIR]crypto_moderne.pdf03-Feb-2009 20:31204.73Kanalysis algo stegano wordlists
[DIR]cryptoanalyse.pdf03-Feb-2009 20:3164.20Kanalysis algo stegano wordlists
[DIR]cryptography_new.pdf03-Feb-2009 20:31219.37Kanalysis algo stegano wordlists
[DIR]cryptosizes.pdf03-Feb-2009 20:31438.23Kanalysis algo stegano wordlists
[DIR]cucs-021-04.pdf03-Feb-2009 20:31130.88K 
[DIR]dean02.pdf03-Feb-2009 20:3193.97K 
[DIR]djalil-crypto.pdf03-Feb-2009 20:31157.32Kanalysis algo stegano wordlists
[DIR]elec6703-2-3.pdf03-Feb-2009 20:3159.52K 
[DIR]esm.pdf03-Feb-2009 20:3160.46K 
[DIR]essay-037.pdf03-Feb-2009 20:3131.24K 
[DIR]examples.pdf03-Feb-2009 20:3137.11K 
[DIR]fawkes.pdf03-Feb-2009 20:31122.05K 
[DIR]fox_ujf.pdf03-Feb-2009 20:31401.57K 
[DIR]fse93.pdf03-Feb-2009 20:3176.90K 
[DIR]fusion.pdf03-Feb-2009 20:31147.55K 
[DIR]gladman.pdf03-Feb-2009 20:3145.12K 
[DIR]herys.pdf03-Feb-2009 20:3110.37K 
[DIR]high-perf-crypto.pdf03-Feb-2009 20:3145.66Kanalysis algo stegano wordlists
[DIR]histoire_cryptographie.pdf03-Feb-2009 20:31215.41Kanalysis algo stegano wordlists
[DIR]inc1.pdf03-Feb-2009 20:31258.61K 
[DIR]inc2.pdf03-Feb-2009 20:31236.62K 
[DIR]inchash.pdf03-Feb-2009 20:31427.08K 
[DIR]internet-modes.pdf03-Feb-2009 20:3162.27K 
[DIR]ipsec.pdf03-Feb-2009 20:31216.47K 
[DIR]katmct.pdf03-Feb-2009 20:3198.45K 
[DIR]key-mngmt-crypto-fs.pdf03-Feb-2009 20:3156.92Kanalysis algo stegano wordlists
[DIR]keyrecovery.pdf03-Feb-2009 20:31169.32K 
[DIR]lars_knudsen.pdf03-Feb-2009 20:31301.41K 
[DIR]lpe.pdf03-Feb-2009 20:31242.45K 
[DIR]marco.pdf03-Feb-2009 20:31232.75K 
[DIR]matrices.pdf03-Feb-2009 20:31120.90K 
[DIR]md5-vs-sha.txt03-Feb-2009 20:314.83K 
[DIR]md5_someday.pdf03-Feb-2009 20:3154.59K 
[DIR]memoire-julien.pdf03-Feb-2009 20:31720.29K 
[DIR]modesv2.pdf03-Feb-2009 20:31117.81K 
[DIR]musee.pdf03-Feb-2009 20:31717.82K 
[DIR]new_introduction_crypto.pdf03-Feb-2009 20:31278.17Kanalysis algo stegano wordlists
[DIR]oakland.pdf03-Feb-2009 20:31263.42K 
[DIR]ocb-full.pdf03-Feb-2009 20:31659.44K 
[DIR]ocf.pdf03-Feb-2009 20:31133.32K 
[DIR]odyssey.pdf03-Feb-2009 20:31120.38K 
[DIR]onetime.pdf03-Feb-2009 20:3150.11K 
[DIR]paper716.pdf03-Feb-2009 20:3175.57K 
[DIR]paper722.pdf03-Feb-2009 20:3133.70K 
[DIR]paper723.pdf03-Feb-2009 20:3130.21K 
[DIR]paper724.pdf03-Feb-2009 20:3185.47K 
[DIR]paper726.pdf03-Feb-2009 20:3146.50K 
[DIR]paper732.pdf03-Feb-2009 20:3132.96K 
[DIR]paper735.pdf03-Feb-2009 20:3133.17K 
[DIR]paper736.pdf03-Feb-2009 20:3138.50K 
[DIR]paper737.pdf03-Feb-2009 20:31100.62K 
[DIR]paper738.pdf03-Feb-2009 20:31134.52K 
[DIR]paper740.pdf03-Feb-2009 20:3140.01KExecutable source code and non-executable source code: analysis and relationships
[DIR]paper751.pdf03-Feb-2009 20:3133.15K 
[DIR]paper764.pdf03-Feb-2009 20:3169.73K 
[DIR]paper768.pdf03-Feb-2009 20:3159.96K 
[DIR]paper874.pdf03-Feb-2009 20:3172.51K 
[DIR]paper878.pdf03-Feb-2009 20:31270.75K 
[DIR]paper879.pdf03-Feb-2009 20:31244.73K 
[DIR]paper885.pdf03-Feb-2009 20:31394.69K 
[DIR]paper886.pdf03-Feb-2009 20:3171.63K 
[DIR]perf.pdf03-Feb-2009 20:31178.96K 
[DIR]pitfalls.pdf03-Feb-2009 20:3155.66K 
[DIR]preprint_frey.pdf03-Feb-2009 20:31336.19KTutorials vx en francais
[DIR]qbsc_2004.pdf03-Feb-2009 20:3162.26K 
[DIR]queensland.pdf03-Feb-2009 20:31202.09K 
[DIR]robustness.pdf03-Feb-2009 20:31123.39K 
[DIR]secret_key_cryptography.pdf03-Feb-2009 20:311.12Manalysis algo stegano wordlists
[DIR]shi_asap00.pdf03-Feb-2009 20:3162.80K 
[DIR]skipjack-kea.pdf03-Feb-2009 20:31213.77K 
[DIR]text.pdf03-Feb-2009 20:3125.51K 
[DIR]thesis-ac.pdf03-Feb-2009 20:31667.61K 
[DIR]thesis.pdf03-Feb-2009 20:311.63M 
[DIR]trapdoor.pdf03-Feb-2009 20:3140.57K 
[DIR]understanding_ssl.pdf03-Feb-2009 20:31265.44K 
[DIR]usenix00.pdf03-Feb-2009 20:31293.43K 
[DIR]wake.pdf03-Feb-2009 20:31150.26K 

Un être privé de la fonction d'irréel est aussi névrosé qu'un être privé de la fonction de réel.
          .-,        <,`-.__.-'>
         / |          )       (
         | ;         /_   ^4^  \_
         \  \.-~~-.__\=_  -'- _/=
          \             `---;`
          /    |            |__
         ;     /    ,    |  /  `~.
        |    .'~..__|    /.' `'~,_)
        T  (`  |  ( ;   |
         \  \   '._) \  \_
          '._)        ',__)