Collection of books on cryptography, quantum cryptography
Sold 1
Refunds 0
Good feedbacks 0
Bad feedbacks 0
In this distribution presentation of the book and articles on cryptography, quantum cryptography, cryptology.
IMPORTANT - The folder structure:
\u003cBASE\u003e - Contains basic documentation of the collection at the time of distribution.
\u003cSOFT\u003e - It contains a rare software needed for opening files.
<#N Ussue - DD.MM.YYYY> - the folder have an update on the date DD.MM.YYYY, #N number of updates.
At the root of the file describing the content KATALOG.doc.
PS: do not run Sider
Folder \u003cBASE\u003e (Folder) Quantum crypto
A Quantum Leap for Cryptography.pdf
A quick glance at quantum cryptography - Lomonaco SJdjvu
Plug and Play quantum cryptography.pdf
Quantum cryptography (2002) - group of applied phyzics.pdf
Quantum cryptography (2004) - group of applied phyzics.pdf
Quantum Information Theory and Applications to Quantum Cryptography - Nikolaos P. Papadakos.pdf
(Subfolder quantum crypto) Articles:
Quantum key distribution over 67 km with a plug & play system.pdf
The algorithm is a common key using a quantum channel svyazi.pdf
Quantum cryptography - Krasavin.doc
Quantum cryptography - Semenov.doc
Quantum kriptografiya- expensive toy or a technology of the future - Vinokurov.doc
Quantum kriptografiya- basis for development and information obespechenie.pdf
On the instability of quantum cryptography - Gorshkov.doc
On one approach to constructing quantum codes II.pdf
On one approach to constructing quantum kodov.pdf
What's wrong with the classic kriptografiey.mht
(Folder) Cryptography
A Computational Introduction To Number Theory and Algebra (2004) - Victor Shoup.pdf
A Computational Introduction To Number Theory And Algebra (2005) - Cambridge University Press.pdf
A Course In Number Theory And Cryptography (2nd ed.) - Koblitz Neal.djvu
Advances in Cryptology. CRYPTO 2004. 24th Annual International Cryptology Conference (2004) - Spr.pdf
Advances in Elliptic Curve Cryptography (2005) - Cambridge University Press.pdf
Applied Cryptography SE Protocols, Algorthms, and Source Code in C (1996) - Bruce Schneier.pdf
BigNum Math. Implementing Cryptographic Multiple Precision Arithmetic (2006) - Denis T., Rose G.djvu
Codes and Ciphers. Julius Caesar the Enigma and the Internet (2004) - Cambridge University Press.pdf
Coding and Cryptography (1998) - Korner.pdf
Complexity and Cryptography An Introduction (2006) - Cambridge University Press.pdf
Contemporary Cryptography (2005) - Artech House.pdf
Cracking DES Secrets of Encryption Research, Wiretap Politics, and Chip Design (1998) .pdf
Cryptographic Hardware and Embedded Systems (2005) - Springer.pdf
Cryptographic Security. Architecture, Design and Verification - Springer.pdf
Cryptographie - Stinson (france) .djvu
Cryptography For Dummies (2004) - Cobb.chm
Cryptography Theory And Practice - Douglas Stinson.chm
Cryptography. A Very Short Intro (2002) - Piper, Murphy.chm
Cryptography.An introduction to computer security.1989 - Sebery J.pdf
Dr.Dobb's essential books on cryptography and security (1997) .rar
Elementary Number Theory (2003) - Clark W Edwin.pdf
Foundations of Cryptography.pdf
Fundamentals of cryptology. A professional reference and interactive tutorial.pdf
Generating a Product of Three Primes with an Unknown Factorization.pdf
Guide to Elliptic Curve Cryptography - D. Hankerson, A. Menezes, S. Vanstone.pdf
Handbook of applied cryptography (1997) - Menezes A., van Oorschot P., Vanstone S.djvu
Internet Security. Cryptographic Principles, Algorithms And Protocols (2003) - Man Young Rhee.pdf
Lecture Notes on Cryptography (2001) - Goldwasser S., Belare M.pdf
Modern Cryptography Protect Your Data with Fast Block Ciphers (2003) -Goots, Izotov, Moldovyan, Moldovya.chm
Modern Cryptography Theory and Practice (2003) - By Wenbo Mao.pdf
Some Applications of coding theory in cryptography (2000) - Doumen, Jeroe
IMPORTANT - The folder structure:
\u003cBASE\u003e - Contains basic documentation of the collection at the time of distribution.
\u003cSOFT\u003e - It contains a rare software needed for opening files.
<#N Ussue - DD.MM.YYYY> - the folder have an update on the date DD.MM.YYYY, #N number of updates.
At the root of the file describing the content KATALOG.doc.
PS: do not run Sider
Folder \u003cBASE\u003e (Folder) Quantum crypto
A Quantum Leap for Cryptography.pdf
A quick glance at quantum cryptography - Lomonaco SJdjvu
Plug and Play quantum cryptography.pdf
Quantum cryptography (2002) - group of applied phyzics.pdf
Quantum cryptography (2004) - group of applied phyzics.pdf
Quantum Information Theory and Applications to Quantum Cryptography - Nikolaos P. Papadakos.pdf
(Subfolder quantum crypto) Articles:
Quantum key distribution over 67 km with a plug & play system.pdf
The algorithm is a common key using a quantum channel svyazi.pdf
Quantum cryptography - Krasavin.doc
Quantum cryptography - Semenov.doc
Quantum kriptografiya- expensive toy or a technology of the future - Vinokurov.doc
Quantum kriptografiya- basis for development and information obespechenie.pdf
On the instability of quantum cryptography - Gorshkov.doc
On one approach to constructing quantum codes II.pdf
On one approach to constructing quantum kodov.pdf
What's wrong with the classic kriptografiey.mht
(Folder) Cryptography
A Computational Introduction To Number Theory and Algebra (2004) - Victor Shoup.pdf
A Computational Introduction To Number Theory And Algebra (2005) - Cambridge University Press.pdf
A Course In Number Theory And Cryptography (2nd ed.) - Koblitz Neal.djvu
Advances in Cryptology. CRYPTO 2004. 24th Annual International Cryptology Conference (2004) - Spr.pdf
Advances in Elliptic Curve Cryptography (2005) - Cambridge University Press.pdf
Applied Cryptography SE Protocols, Algorthms, and Source Code in C (1996) - Bruce Schneier.pdf
BigNum Math. Implementing Cryptographic Multiple Precision Arithmetic (2006) - Denis T., Rose G.djvu
Codes and Ciphers. Julius Caesar the Enigma and the Internet (2004) - Cambridge University Press.pdf
Coding and Cryptography (1998) - Korner.pdf
Complexity and Cryptography An Introduction (2006) - Cambridge University Press.pdf
Contemporary Cryptography (2005) - Artech House.pdf
Cracking DES Secrets of Encryption Research, Wiretap Politics, and Chip Design (1998) .pdf
Cryptographic Hardware and Embedded Systems (2005) - Springer.pdf
Cryptographic Security. Architecture, Design and Verification - Springer.pdf
Cryptographie - Stinson (france) .djvu
Cryptography For Dummies (2004) - Cobb.chm
Cryptography Theory And Practice - Douglas Stinson.chm
Cryptography. A Very Short Intro (2002) - Piper, Murphy.chm
Cryptography.An introduction to computer security.1989 - Sebery J.pdf
Dr.Dobb's essential books on cryptography and security (1997) .rar
Elementary Number Theory (2003) - Clark W Edwin.pdf
Foundations of Cryptography.pdf
Fundamentals of cryptology. A professional reference and interactive tutorial.pdf
Generating a Product of Three Primes with an Unknown Factorization.pdf
Guide to Elliptic Curve Cryptography - D. Hankerson, A. Menezes, S. Vanstone.pdf
Handbook of applied cryptography (1997) - Menezes A., van Oorschot P., Vanstone S.djvu
Internet Security. Cryptographic Principles, Algorithms And Protocols (2003) - Man Young Rhee.pdf
Lecture Notes on Cryptography (2001) - Goldwasser S., Belare M.pdf
Modern Cryptography Protect Your Data with Fast Block Ciphers (2003) -Goots, Izotov, Moldovyan, Moldovya.chm
Modern Cryptography Theory and Practice (2003) - By Wenbo Mao.pdf
Some Applications of coding theory in cryptography (2000) - Doumen, Jeroe