Zoom Icon

Privacy and Cryptography

From UIC Archive

Contents


In this section you'll find a collection of documents an packages on various topics like: cryptography, privacy, anonimity, cryptanalysis...

» Cryptanalysis

Title: Tunnels in Hash Functions: MD5 Collisions Within a Minute
Author: Vlastimil Klima
Source: Source (a collision in 31 seconds on a notebook).

Title: Unbalanced Feistel Networks and Block Cipher Design
Author: Bruce Schneier/JohnKelsey

Title: Possible backdoor in NIST SP800-90 Dual EC pseudo-random number generator
Author: Shumow/Ferguson

Title: Finding Collisions in the Full SHA-1
Author: Xiaoyun Wang

Title: Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
Author: Xiaoyun Wang

Title: Efficient Collision Search Attacks on SHA-0
Author: Xiaoyun Wang

Title: Cryptanalysis of the Hash Functions MD4 and RIPEMD
Author: Xiaoyun Wang

Title: How to Break MD5 and Other Hash Functions
Author: Xiaoyun Wang

Title: Colliding X.509 Certificates
Author: Xiaoyun Wang

Title: How to attack an algorithm
Author: Peter Guttman

Title: Weaknesses in the Key Scheduling Algorithm of RC4
Author: Scott Fluhrer, Itsik Mantin, and Adi Shamir

Title: Breaking WEP in less than 60 seconds
Author: Eric Tews, Ralf-Philipp Weinmann, Andrei Pyshkin

Title: Attacks on the RC4 stream cipher
Author: Andreas Klein

Title: A Natural Language Approach to Automated Cryptanalysis of Two-time Pads
Author: J. Mason, K. Watkins, J. Eisner, A. Stubblefield

» Cryptography

Title: Reverse Engineering of Strong Crypto Signatures Schemes
Author: Evilcry

Title: Studio sui One Time Pads e cracking dei messaggi
Author: Quequero

Title: RC4 Analysis and Cryptanalysis
Author: Quequero

Title: Blowfish study 'n reverse
Author: Evilcry

Title: RSA defeating 'n reversing
Author: Evilcry

Title: ElGamal studio e reversing
Author: Evilcry

Title: Cifratura Playfair
Author: ev0

Title: Costruzione di un algoritmo Wipe-Way
Author: Quequero

Title: Idea 2.2 - Encryption program that uses IDEA, source code included (14kb)
Author: Xuejia Lai

Title: Blowfish Description and source code
Author: Bruce Schneier

Title: Cryptography Excercises
Author: Pate Williams

Title: Tiny Encryption Algorithm (ASM source)
Author: Fauzan Mirza

Title: IDEA optimized for slower processors (ASM source)
Author: [Lai]

Title: RC6 source code
Author: Ron Rivest

Title: TwoFish source code
Author: Bruce Schneier

Title: Brief introduction to DES algorithm
Author: Eric

Title: Source code of Magenta algorithm
Author: Deutche Telekom

Title: Explanation of IDEA algorithm
Author: Fauzan Mirza

Title: Examples and code on Rivest's winnowing/chaffing
Author: Michael Graffam

Title: RSAEuro v1.03
Author: RSA

Title: SHS - Hash algorithm written and commented from Michael Graffam
Author: Michael Graffam

Title: Guttam essay on Encryption and Security
Author: Peter Guttman

Title: MD5 source optimized for 32-bit processors
Author: Phil Karn

Title: Asm and Pascal source code of MD5
Author: R. Rothenburg

Title: Source code of CRC-32 v1.03
Author: Craig Bruce

Title: Concatenazioni, Hashing, ReHashing, Collisioni, probabilità di non collisione
Author: Mario Angeli

Title: Cryptography and Computer Privacy
Author: Horst Feistel

Title: Communication Theory of Secrecy Systems
Author: Claude Elwood Shannon

Title: Mathematical Theory of Communication
Author: Claude Elwood Shannon

» Privacy

Title: Cosa sono e come funzionano gli Anonymous Remailer
Author: Quequero