Technique
History
Math
Linguistics
Computers
Social Sciences
Psychology
Free Cryptography Books
Прикладная криптография. Использование и синтез криптографических интерфейсов
Математические основы криптографии
Oracle Cryptographic Toolkit Programmer's Guide 2.0.4
Lecture Notes on Cryptography
Generating a Product of Three Primes with an Unknown Factorization
Foundations of Cryptography
Kryptologie : eine Einfuhrung in die Wissenschaft vom Verschlusseln, Verbergen und Verheimlichen : ohne alle Geheimniskramerei, aber nicht ohne hinterlistigen Schalk, dargestellt zum Nutzen und Ergotzen des allgemeinen Publikums
Kryptographie und IT-Sicherheit
Contemporary Cryptology
The Physics of Quantum Information: Quantum Cryptography, Quantum Teleportation, Quantum Computation
Elementary Number Theory, Cryptography and Codes
Cracking Codes Dummies
Complexity Theory and Cryptology
Complexity and Cryptography: An Introduction
The laws of cryptography with Java code
Finite Automata and Application to Cryptography
Twenty Years of Attacks on the RSA Cryptosystem
RSA Labs FAQ 4.0
Report Advanced Cryptography Standard AES
Practical cryptography
Number Theory An Related Alghoritm In Cryptography
New Encryption Technologies for Communications Designers
Cryptography And Data Security
Coding and Cryptography
CISSP Studyguide on Cryptography
Block Ciphers And Cryptanalysis
Coding Theory and Cryptography
AACS Introduction and Common Cryptographic Elements
Handbook of applied cryptography
Transactions on Data Hiding and Multimedia Security II
Information Hiding: 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers
Introduction to automata theory, languages, and computation
Криптография и ПСА
Complexity and Cryptography
Contemporary Cryptography
Number Story: From Counting to Cryptography
Advances in Cryptology – CRYPTO 2004: 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004. Proceedings
Contemporary Cryptology
Decrypted Secrets: Methods and Maxims of Cryptology
Cryptography and Public Key Infrastructure on the Internet
Алгоритмы шифрования: классификация алгоритмов шифрования и методов их вскрытия, новейшая история симметричного шифрования, описание алгоритмов: специальный справочник
Classical and Contemporary Cryptology
Understanding cryptography: a textbook for students and practitioners
Elementary Number Theory, Cryptography and Codes
Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings
Elliptic Curves: Number Theory and Cryptography
Elementary Number Theory, Cryptography and Codes
Cryptanalytic Attacks on RSA
Advances in Elliptic Curve Cryptography
Cryptographic Boolean Functions And Applications
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Disappearing Cryptography, Third Edition: Information Hiding: Steganography & Watermarking
Cryptography: Theory and Practice
Теоретическая криптография
Совершенные шифры
Поточные шифры. Результаты зарубежной открытой криптологии
Основные тенденции развития открытой криптографии
Однонаправленная функция с «секретом» на базе КАМСИ
О НЕСТОЙКОСТИ КВАНТОВОЙ КРИПТОГРАФИИ
Криптография и компьютерная безопасность
Квантовая криптография- дорогая игрушка или технология будущего
Квантовая криптография
Введение в криптографию
Прикладная криптография
Асимметричный криптографический алгоритм на базе Конечно-Автоматной Модели, Сохраняющей Информацию
Асимметричный криптографический алгоритм на базе Конечно-Автоматной Модели, Сохраняющей Информацию
Алгоритмические основы элиптической криптографии
Современная криптология
Криптографические методы защиты информации
Стандарт криптографической защиты - AES. Конечные поля
Практическая Криптография
Компьютерная безопасность: Криптогр. методы защиты
Булевы функции в теории кодирования и криптологии
Analysis and Design of Cryptographic Hash Functions
Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings
Theory of Cryptography: Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings
Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings
Selected Areas in Cryptography: 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers
Selected Areas in Cryptography: 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers
Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003. Revised Papers
Research in Cryptology: Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers
Public Key Cryptography – PKC 2008: 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings
Public Key Cryptography – PKC 2007: 10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedings
Public Key Cryptography - PKC 2005: 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedings
Public Key Cryptography – PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004. Proceedings
Progress in Cryptology – INDOCRYPT 2007: 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings
Probabilistic and Statistical Methods in Cryptology: An Introduction by Selected Topics
Progress in Cryptology - VIETCRYPT 2006: First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006. Revised Selected Papers
Information Security and Cryptology – ICISC 2008: 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers
Information Security and Cryptology - ICISC 2007: 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings
Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers
Cryptography and Coding: 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings
Cryptographic Hardware and Embedded Systems - CHES 2006: 8th International Workshop, Yokohama, Japan, October 10-13, 2006. Proceedings
Cryptographic Hardware and Embedded Systems – CHES 2005: 7th International Workshop, Edinburgh, UK, August 29 – September 1, 2005. Proceedings
Cryptographic Hardware and Embedded Systems - CHES 2003: 5th International Workshop, Cologne, Germany, September 8–10, 2003. Proceedings
Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop Redwood Shores, CA, USA, August 13–15, 2002 Revised Papers
Advances in Cryptology – EUROCRYPT 2008: 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings
Advances in Cryptology - EUROCRYPT 2007: 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings
Advances in Cryptology – CRYPTO 2008: 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings
Advances in Cryptology - CRYPTO 2007: 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007. Proceedings
1
2
3
4
...
Go to Page
GO
Technique
History
Math
Linguistics
Computers
Social Sciences
Psychology