The literature on code numbers and enciphering
Safety - myths and a reality
Biometric protection of the information
Protection in Windows 95-98-Me
Fireproof wall
Cycle of articles on cryptography
Algorithms of enciphering
Cryptographic algorithms
Special cryptographic reports
Cryptography with an open key - from the theory to the standard
FAQ on computer cryptography
Algorithm of enciphering of GOST 28147-89. A method of simple replacement
Introduction in cryptography
The code number the Ale-gamalja
Криптосистема
RSA
Why
криптосистемы
are unreliable
Weak places of cryptographic systems
Криптоанализ the
tunnel report of type a point-point (PPTP) from Microsoft
The general description of time attack
Attacks on RSA
Method of a meeting in the middle of attack
Cryptography
Typical defects in cryptographic reports
Andrey Vinokurov. A problem
аутентификации the
data and block code numbers.
Andrey Vinokurov. How the block code number is arranged?
DEAL - 128 bit block code number
Aleksandar Jurisic, Alfred J. Menezes. Elliptic Curves and Cryptography
Current public-key cryptographic systems
Algorithm of enciphering of GOST 28147-89, its use and realisation for computers of platform Intel x86
Subscribe
Subscribe.Ru
The Family Tree of Family