Home
/
Books
/
incoming
File Name
Size
Date
..
—
—
AForward-SecurePublic-KeyEncryptionScheme(2003)-Canetti,Halevi,Katz.pdf.gz
273.74KB
04-07-2024 16:40:50
Bitmessage A Peer‐to‐Peer Message Authentication and Delivery System(2012)-Warren.pdf.gz
188.50KB
04-07-2024 16:40:51
CacheTimingAttacksonCamelliaBlockCipher-Zhao,Wang,Zheng.pdf.gz
463.86KB
04-07-2024 16:40:51
ChillingEffectsNSASurveillanceDrivesU.S.WriterstoSelf-Censor(2013).pdf.gz
664.90KB
04-07-2024 16:40:51
ConvergedAnalysisofSmartphoneDevicesIdentificationProcessingTaskingAllinaday’swork(2010)-PaulaKuruc,NSA.pdf.gz
827.24KB
04-07-2024 16:40:50
EllipticCurveCryptographyinPractice(2013)-Bos,Halderman,Heninger,Moore,Naehrig,Wustrow.pdf.gz
555.50KB
04-07-2024 16:40:51
FinancialCryptographyandDataSecurity(2012).pdf.gz
4.50MB
04-07-2024 16:40:50
HandbookofAppliedCryptography.pdf.gz
3.85MB
04-07-2024 16:40:51
HiddenServiceNamingandTLSCertCheckingwithNamecoinATorGSoCProposal(2014)-Rand.pdf.gz
117.48KB
04-07-2024 16:40:51
HowUniqueandTraceableareUsernames(2011)-Perito,Castelluccia,Kaafar,Manils.pdf.gz
1.03MB
04-07-2024 16:40:51
Key-PrivacyinPublic-KeyEncryption(2001)-Bellare,Boldyreval,Desai,Pointcheval.pdf.gz
247.88KB
04-07-2024 16:40:51
LectureNotesonCryptography-Micali,Goldwasser.pdf.gz
1.33MB
04-07-2024 16:40:50
MicrogliaAreEssentialtoMasculinizationofBrainandBehavior(2013)-Lenz,Nugent,Haliyur,McCarthy.pdf.gz
4.66MB
04-07-2024 16:40:50
OptimisingNodeSelectionProbabilitiesinMulti-HopMD1QueuingNetworkstoReduceLatencyofTor(2014)-Herbert,Murdoch,Punskaya.pdf.gz
75.48KB
04-07-2024 16:40:50
PENAmerican(2013)-ChillingEffects.pdf.gz
664.87KB
04-07-2024 16:40:50
PinocchioNearlyPracticalVerifiableComputation(2012)-Parno,Gentry.pdf.gz
350.00KB
04-07-2024 16:40:50
QUICCrypto(2013)-Langley,Chang.pdf.gz
239.73KB
04-07-2024 16:40:50
RandomizableProofsandDelegatableAnonymousCredentials(2012)-Camenisch,Lysyanskaya.pdf.gz
516.91KB
04-07-2024 16:40:51
RootkitinYourLaptopHiddencodeinyourchipsetandhowtodiscoverwhatexactlyitdoes(2012)-Skochinsky.pdf.gz
1.19MB
04-07-2024 16:40:50
SecretTrans-PacificPartnershipTreatyIntellectualPropertChapterDraft(2013-11-15)-Wikileaks.pdf.gz
554.91KB
04-07-2024 16:40:50
SecureEnd-to-EndCommunicationwithOptimalThroughputInUnreliableNetworks(2013)-Bunn,Ostrovsky.pdf.gz
286.31KB
04-07-2024 16:40:51
UniversallyComposableCommitments(2001)-Canetti,Fischlin.pdf.gz
284.14KB
04-07-2024 16:40:51
UsersGetRoutedTrafficCorrelationonTorbyRealisticAdversaries(2013)-Johnson,Syverson,etal.pdf.gz
1.54MB
04-07-2024 16:40:51
VerifiableSecretSharingandMultipartyProtocolswithHonestMajority(1989)-Rabin,Ben-Or.pdf.gz
1.17MB
04-07-2024 16:40:51
10" >