The literature on code numbers and enciphering

  • Safety - myths and a reality

  • Biometric protection of the information

  • Protection in Windows 95-98-Me

  • Fireproof wall

  • Cycle of articles on cryptography

  • Algorithms of enciphering

  • Cryptographic algorithms

  • Special cryptographic reports

  • Cryptography with an open key - from the theory to the standard

  • FAQ on computer cryptography

  • Algorithm of enciphering of GOST 28147-89. A method of simple replacement

  • Introduction in cryptography

  • The code number the Ale-gamalja

  • Криптосистема RSA

  • Why криптосистемы are unreliable

  • Weak places of cryptographic systems

  • Криптоанализ the tunnel report of type a point-point (PPTP) from Microsoft

  • The general description of time attack

  • Attacks on RSA

  • Method of a meeting in the middle of attack

  • Cryptography

  • Typical defects in cryptographic reports

  • Andrey Vinokurov. A problem аутентификации the data and block code numbers.

  • Andrey Vinokurov. How the block code number is arranged?

  • DEAL - 128 bit block code number

  • Aleksandar Jurisic, Alfred J. Menezes. Elliptic Curves and Cryptography

  • Current public-key cryptographic systems

  • Algorithm of enciphering of GOST 28147-89, its use and realisation for computers of platform Intel x86




  • Яндекс цитирования

    Subscribe Subscribe.Ru
    The Family Tree of Family