| Имя | Размер | Дата расшаривания | Контрольная сумма | Рейтинг | Длительность |
|---|---|---|---|---|---|
| Зубов А.Ю. Совершенные шифры. - М., Гелиос АРВ, 2003. - 160 с | 3692748 | 2016-10-10 17:32:27 +00:00 … 2016-10-11 11:53:36 +00:00 | 7.5 | ||
| Совершенные шифры | 3456903 | 2016-10-10 17:32:27 +00:00 … 2016-10-11 11:53:43 +00:00 | 8.4 | ||
| ШНАЙЕР, Брюс - Прикладная криптография. Протоколы, алгоритмы и исходные тексты на языке C. Изд. 2-е | 3347387 | 2016-10-10 17:32:27 +00:00 … 2016-10-11 11:53:43 +00:00 | 6.6 | ||
| ACM. Issue of Comm. ACM Sept. 2003, vol. 46, no. 9(T)(C)(249s).djvu | 3582284 | 2016-11-04 03:43:06 +00:00 | EK2ODNWFKIHBP5BBAGIZ3DSSHHGY2CYL6ZK6BEA | 4.4 | |
| An Example of the RSA Algorithm.pdf | 16433 | 2016-10-10 17:32:27 +00:00 | OS2QOPJJP4MCVCTQQRZLN5MS2H5PVFKCGKGSWBA | 7.1 | |
| An Introduction to Cryptography(1998)(80).pdf | 843071 | 2016-10-11 11:53:36 +00:00 | ZHS4DOP7XBQZEANJ6WTOWXZIZT5FZDV5FY6XN5Q | 7.5 | |
| Automatentheorie_und_Kryptologie_001(de)(112s).pdf | 541537 | 2016-10-11 11:53:36 +00:00 | F66AZIKH4ZHZCCWHLZL7LRYEETG77NV5IMUIKAY | 7.1 | |
| Baigneres T., Junod P., Lu Y. - A Classical Introduction to Cryptography Exercise Book(2005)(254).pdf | 9370856 | 2016-10-20 07:37:48 +00:00 | V3XKSKVIJHPMXI7ZC4UAVT5MWTTWW46CUMYRTOI | 9.0 | |
| Beissinger J., Pless V. - The Cryptoclub. Using Mathematics to Make and Break Secret Codes(2006)(199).djvu | 5457164 | 2016-11-16 21:36:48 +00:00 | MEARFL3Y4SQGVXUKOQH7FG5GUGT57X6LO3CVQPI | 5.3 | |
| Blahut R.E. Algebraic Codes on Lines, Planes, and Curves (CUP, 2008)(ISBN 0521771943)(567s)_CsCr_.pdf | 2864589 | 2016-10-24 02:04:52 +00:00 | GLOGWK7HO2FUSXZ3QPBJQJZ7NJ2X7FBNNTOWSEI | 3.2 | |
| Blake_I.F.,_Seroussi_G.,_Smart_N.P._Advances_in_Elliptic_Curve_Cryptography_(2005)(en)(298s).pdf | 4884485 | 2016-10-25 07:34:02 +00:00 | PNV7LHEFVBUBYPFHDOGS6TQZZYYQVHMLWRWOUAA | 7.1 | |
| Cheremushkin A.V. Lekcii po arifmeticheskim algoritmam v kriptografii (MCNMO, 2002)(ru)(L)(T)(52s).djvu | 550779 | 2016-10-11 11:53:36 +00:00 | 6AY27BRWIAVLCRLYUKTM636G6XWEOZNGIREF4GY | 6.6 | |
| Cobb C. - Cryptography For Dummies (2004)(en).chm | 4183321 | 2016-10-23 10:49:45 +00:00 | 3C6RP7R73N24PO66LJMS2MLYCSLWQ7PYWTU5JJA | 6.0 | |
| Coding and Cryptography - T. Korner (1998).pdf | 517733 | 2016-12-01 21:46:30 +00:00 | 6Y62KKTQLITJVMP5343FZ6VRTKBB32IB4YQTH5I | 3.2 | |
| Cohen H., Frey G., et al. Handbook of elliptic and hyperelliptic curve cryptography (CRC, 2006)(ISBN 1584885181)(843s)_CsCr_.pdf | 5387456 | 2016-10-13 02:25:52 +00:00 | 254NR54OKQ3AGDT76U2CMTVWIGH5K2YMRND6AUQ | 5.3 | |
| Cole P. H. (Ed), Ranasinghe D. C. (Ed) - Networked Rfid Systems and Lightweight Cryptography. Raising Barriers to Product Counterfeiting(2007)(355).pdf | 9322020 | 2016-11-25 16:13:58 +00:00 | 7PNWPITPYKYGP4M3ISAEHPGSWYN2UO3V4YPQA7I | 3.2 | |
| Cooper J.A., Goldreich O. - Computer Security & Cryptography(2000)(25).pdf | 482760 | 2016-10-10 17:32:27 +00:00 | VYMBSL2LOYAII54R7BAOF7H3MNCTESLOQF4H63I | 7.8 | |
| Cusick T.W., Ding C., Renvall A. Stream Ciphers and Number Theory (Elsevier, 2004)(ISBN 044451631X)(T)(O)(470s)_CsCr_.djvu | 2631049 | 2016-10-18 06:11:47 +00:00 | FMHCWO3ZQQT46QZBPL4FHSE6J4VPCRFJVJK35KQ | 6.0 | |
| Damgard I. Lectures on data security.. Modern cryptology in theory and practice (LNCS1561, Springer, 1999)(ISBN 3540657576)(255s)_CsCr_.pdf | 3090967 | 2016-12-04 12:00:31 +00:00 | RJWXSEEBRQ4VF2JIJY4DKHKTCJKOWD65DAWG2UQ | ||
| Delfs H., Knebl H. - Introduction to Cryptography(2002)(310).pdf | 682808 | 2016-10-11 11:53:36 +00:00 | BE56DKOU4AMCX4T5MN7XG2FQDMQJSD4RPCMX6ZQ | 8.2 | |
| Denis_T.S.,_Rose_G._BigNum_Math[c]_Implementing_Cryptographic_Multiple_Precision_Arithmetic_(2006)(en)(296s).pdf | 5867688 | 2016-11-11 20:52:48 +00:00 | URGC6NKXZV5IUPGMYREFD2L52K26PW7LNNP77KI | 3.2 | |
| Franklin M. - Advances in Cryptology - CRYPTO 2004 . 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings(2004)(579).pdf | 19604843 | 2016-12-07 12:25:31 +00:00 | GCX5CMB46BNO3PLVTKRI4EVM6XMNZA52PPLYBRQ | ||
| Friedman W.F. Military cryptanalysis, parts 1,2,3,4 (1996)(ISBN 0894120441)(T)(O)(649s)_CsCr_.djvu | 8703865 | 2016-11-06 13:58:48 +00:00 | L6G4353SYF76NHVYJ46H23XR2G6GYR6GJ7YUOAQ | 3.2 | |
| Goots_N.,_Izotov_B.,_Moldovyan_A._Modern_Cryptography[c]_Protect_Your_Data_with_Fast_Block_Ciphers_(2003)(en)(412s).chm | 12085560 | 2016-11-16 15:04:20 +00:00 | BFQSDSYMEY6UGWWY34DXTXQTVHJTZKJOJDYXO7Q | 6.6 | |
| Grundbegriffe_der_Kryptographie_001(de)(121s).pdf | 781685 | 2016-10-11 11:53:36 +00:00 | NNMTCKLFBIQ4ZWKGV3TUJCOVZQK5IG526VA64EY | 7.1 | |
| Guide to Elliptic Curve Cryptography.pdf | 4580082 | 2016-12-09 13:16:34 +00:00 | H76J5LTMYCLZJEYBWS6CO5X2W4HN5XIIBVJYEPI | ||
| Gutmann P. - Cryptographic Security Architecture. Design and Verification(2003)(360).pdf | 2822553 | 2016-10-24 06:08:52 +00:00 | UVTFCTMEHLH2IEG3MDBENJTX35QWQ7PNCHKKCCA | 5.3 | |
| Hankerson, Menezes, Vanstone. Guide to elliptic curve cryptography (Springer, 2004)(ISBN 038795273X)(332s)_CsCr_.pdf | 2679307 | 2016-10-17 15:58:54 +00:00 | IN45C4QH6XO4BRMOYABL3SGN5KOEDSCFI33NTPA | 6.6 | |
| Hoffstein, Pipher, Silverman. An introduction to mathematical cryptography (Springer, 2008)(ISBN 0387779930)(533s)_CsCr_.pdf | 3629942 | 2016-10-31 23:19:47 +00:00 | 4Y3EGMNOW26CET3PEMBECJYD5OQYTP4HSCXJ4JI | 4.4 | |
| Kong X., Yuan Zh. - KG -Strong Semilattice Structure of Regular Orthocryptosemigroups (2006)(14s).pdf | 419192 | 2016-10-10 17:32:27 +00:00 | ID2BM6BONVHDY3XV3A5XSTRYDPVI3YXAGOBW62A | 7.5 | |
| Kryptographie_001(de)(109s).pdf | 633329 | 2016-10-11 11:53:36 +00:00 | ACNTWTOLW4H7ALHZDBIDBJ6NGQVAB44GDK4PSPA | 7.5 | |
| Kryptographie_I_001(de)(108s).pdf | 832563 | 2016-10-11 11:53:36 +00:00 | G7HTOIDAMN2PGLPUUM7VDOVDLJZ6D6NFI5JR52I | 7.1 | |
| Kryptographie_I_II_001(de)(114s).pdf | 453989 | 2016-10-10 17:32:27 +00:00 | UMM2N5AA75QBUQVOF5ZN6KDTRYIBQWKQNTLEJTY | 6.6 | |
| Kryptologie_003(de)(245s).pdf | 1361118 | 2016-10-22 07:23:45 +00:00 | CZ2KWOSSHOOEFULB45XXWCZ2R53JS4GXKI2C55Y | 4.4 | |
| Kryptologie_1_001(de)(112s).pdf | 676856 | 2016-10-11 11:53:36 +00:00 | BHGIYJFZJNUCQHITGQOGRBBTTW5FQKBMIZOOO3A | 7.1 | |
| Loepp S., Wootters W.K. Protecting Information.. From Classical Error Correction to Quantum Cryptography (CUP, 2006)(ISBN 9780521827409)(305s)_CsCr_.pdf | 1009671 | 2016-10-11 11:53:36 +00:00 | 6W2TIMBYJQG66BE7KUVLBO2Y7CFNQVJ5PSHFGZI | 8.8 | |
| Menezes A., van Oorschot P., Vanstone S. Handbook of applied cryptography (CRC, 1997)(T)(746s)_CsCr_.djvu | 6612634 | 2016-11-16 14:03:20 +00:00 | OTN7HHYXAEQZTWJ6VWPP23A4HDLRLEOED6WOM7I | 6.0 | |
| Menezes_A.J.,_Oorschot_P.C.,_Vanstone_S.A._Handbook_of_Applied_Cryptography_(1996)(en)(794s).pdf | 4857327 | 2016-10-22 06:22:45 +00:00 | LRGXBG2ON4BPPSZDYAENHZVFWHY2NSJRD3IN6NQ | 5.3 | |
| Menezes_A.J.,_van_Oorschot_P.C.,_Vanstone_S.A._Handbook_of_Applied_Cryptography_(1997)(en)(780s).pdf | 6656591 | 2016-11-26 14:35:00 +00:00 | GIQGSB2TTGC2FTYG7Y2T4QQJKW5IVNEHQVI5L2Y | 3.2 | |
| Modern Cryptography - Theory and Practice.pdf | 18669783 | 2016-10-22 12:28:45 +00:00 | EGTKBHNKNU46UCKYXH2QFVF2HLCYOPLPAAMUVEA | 9.6 | |
| Mollin R. Codes.. The guide to secrecy from ancient to modern times (CRC, 2005)(ISBN 1584884703)(700s)_CsCr_.pdf | 4190680 | 2016-10-21 14:06:45 +00:00 | VLKGGV35CWYDBR7363I47DEOBSFQ6EU5AU2L57A | 5.3 | |
| Mollin R. RSA and public-key cryptography (CRC, 2003)(ISBN 1584883383)(275s)_CsCr_.pdf | 1377078 | 2016-10-30 05:28:47 +00:00 | BUIAA6R3KWUTOZZ5M45PFQXBZHSOEWMVL3U5E6Y | 5.3 | |
| National Research Council - Cryptography's Role In Securing The Information Society(1996)(720).pdf | 1491913 | 2016-12-03 03:36:52 +00:00 | VQDZ5NP4QEMKOO3NAL7CNC5AJE7QT2HCIKMSAKQ | 3.2 | |
| Neuenschwander D. - Probabilistic and Statistical Methods in Cryptology. An Introduction by Selected Topics(2004)(1st edition)(158).djvu | 613304 | 2016-10-11 11:53:36 +00:00 | 6FQCUY2GL5UOCM4AKINBJJMR6POPEHHCQEXCFFI | 6.6 | |
| Oppliger R. - Contemporary Cryptography(2005)(503).pdf | 8048306 | 2016-11-02 00:44:47 +00:00 | CLMPFPYS4MN4SPJIXH5XXWKR3Q3E2I762XI42JQ | 6.0 | |
| PGP для персональной приватности.pdf | 1106141 | 2016-10-30 08:31:47 +00:00 | 3JVAKSODYOPT2RKES3A2TXXR3UQ5V77B4OZ66HY | 3.2 | |
| Papadakos_N.P._Quantum_Information_Theory_and_Applications_to_Quantum_Cryptography_(2001)(en)(39s).djvu | 351535 | 2016-10-10 17:32:27 +00:00 | LZJC7ZWIOG22NDSAIOU3ENPYRXOE76DDTYRG6NI | 6.6 | |
| Progress On Cryptography - 25 Years Of Crypto In China - K. Chen (Kluwer, 2004).pdf | 5234741 | 2016-11-25 14:12:00 +00:00 | NPVNRIOKJRVQHAR63AXJI66ATI3VRFFA7P7DCCA | 3.2 | |
| Ryabko B., Fionov A. Kriptograficheskie metody zashchity informacii (MTU-NET, 2005)(600dpi)(ru)(T)(S)(229s)_CsCr_.djvu | 2209772 | 2016-11-01 08:28:47 +00:00 | AEY77DX2WEBQ3JB53P5WEKAGRZBAFUXSQAE5HHY | 3.2 | |
| Schneier B. - Applied cryptography[c] protocols, algorithms, and source code in C (1995)(2nd ed.)(en).chm | 3795039 | 2016-11-08 15:25:07 +00:00 | 24IQ7H24VBCYVF6HTTQN6P77TSOQD3Y2FB5JC3I | 3.2 | |
| Sebery J.Cryptography.An introduction to computer security.1989.pdf | 3936958 | 2016-12-11 00:10:32 +00:00 | KWJOSSNSG2D5DR7X6ZUT4FJ4YOPTRSJDOVR26LI | ||
| Smart N. Kriptografiya (Texnosfera, 2005)(ru)(529s)_CsCr_.pdf | 8506310 | 2016-12-06 07:04:34 +00:00 | 6VOTL6CEDMFCWOA5HYDTJEIPB5P6FQBXMMUGVEI | ||
| Springer.Finite.Automata.And.Application.To.Cryptography.Jan.2009.eBook-ELOHiM.pdf | 2963407 | 2016-12-02 03:51:34 +00:00 | XIHMWHODZMZ67I54S4L27BQ5PAD724FNWTEEIUQ | ||
| Springer.Networked.RFID.Systems.and.Lightweight.Cryptography.Dec.2007.pdf | 6754172 | 2016-11-29 13:53:38 +00:00 | V7ZTT6EQUYSNUXW3OGVK3EIBEIALPWXAPSELL6I | ||
| St_Denis_T._Cryptography_for_Developers_(2006)(en)(400s).pdf | 4299742 | 2016-10-16 06:36:53 +00:00 | GEZRHLSAXF7REG2HDNU2KMYNABMOB4VOW2DA4WY | 7.8 | |
| Stallings W. - Cryptography and Network Security Principles and Practices(2005)(Fourth Edition)(592).chm | 12998992 | 2016-10-27 15:28:52 +00:00 | PZXRGAQNRTVXNWXXH4TQJVLFXLMZIW3MP4B7YWI | 7.1 | |
| Tilborg H. C. (Ed) - Encyclopedia of Cryptography and Security(2005)(First Edition)(1520).pdf | 9919613 | 2016-11-17 23:22:48 +00:00 | 7JEA7LWHF2CQPKJL5ASEW6SZPLWXOQYRICFOLGY | 3.2 | |
| Tom St Denis, Simon Johnson, Cryptography for Developers - Syngress (2007)(1597491047)(PDF) English.pdf | 5257123 | 2016-10-24 11:13:52 +00:00 | O54IZ6RIRSNCX3CQQBBJ5274ZM5L7SFXLGO7ZKA | 7.1 | |
| Trappe W., Washington L.C. Introduction to cryptography with coding theory (PH, 2002)(ISBN 0130618144)(T)(K)(600dpi)(487s)_CsCr_.djvu | 2902958 | 2016-11-23 04:49:50 +00:00 | PDJTNO6VBNDJG7XQ7UKH7UCGK7GGIFQSENW4OTA | 3.2 | |
| Wobst R. - Cryptology Unlocked(2007)(554).pdf | 4923365 | 2016-10-25 07:34:02 +00:00 | LTRFJQLUUGC472KOLJ65QY5BBKESNE6ZBKCOL5Q | 6.0 | |
| cryptbook.pdf | 148240 | 2016-10-10 17:32:27 +00:00 | IWM5PO53HEEZDQKCWO3PT2A34N436SDAEHZSI6Q | 6.6 | |
| А.А. Болотов, С.Б. Гашков, А.Б. Фролов, А.А. Часовских - Элементарное введение в эллиптическую криптографию.2006.djvu | 15323256 | 2016-12-11 12:22:26 +00:00 | VCKW7U56MHTCDBMAM7A6SGZYUMDT6YGXI4YOPCA | ||
| Адигеев М.Г. - Введение в криптографию. ч.1 (2002).pdf | 417565 | 2016-11-18 11:34:58 +00:00 | GQZJE4QH2BOSFOHPZO7BDRMF5QDHN6R5A3L3MMQ | 4.4 | |
| Алгоритмы шифрования.Специальный справочник.-Панасенко Сергей,2009.djvu | 7775086 | 2016-10-30 10:33:47 +00:00 | Q4WOWTZ3LXDJ4RI2KBMZPQFDFGSF5CUBLNFQ2AY | 4.4 | |
| Алферов, Зубов, Кузьмин, Черемушкин - Основы криптографии 2005.djvu | 19628052 | 2016-11-26 21:41:51 +00:00 | 3ERYNJWM2C3VEMJ56EK3GKUVC3C4CTCBEOTUEYI | 8.2 | |
| Аршинов, Садовский. Коды и математика (Рассказы о кодировании), 1983.djvu | 2381558 | 2016-11-11 00:37:44 +00:00 | PBFORD74VTGBACCCI3TLWBMIAEEMXY2WKJCIZ6A | 3.2 | |
| Бабаш А. В., Шанкин Г. П. - Криптография (2007)(511s).djvu | 9650885 | 2016-11-19 10:54:49 +00:00 | NDI6JWPOMUCYG7CO2RZ35G3AANZBIR4WBA57NTY | 4.4 | |
| Баричев С. Г., Гончаров В. В., Серов Р. Е. - Криптография без секретов.djvu | 307004 | 2016-10-10 17:32:27 +00:00 | EBBIYVB7TNUEN3P2KQJ5OTFSCOLPMAUQMVBAUXA | 6.6 | |
| Баричев С.Г., Серов Р.Е. Основы современной криптографии.djvu | 763835 | 2016-10-11 11:53:36 +00:00 | 5VIL77CIPNLAKMLGGZBMDGGOXBDGIYN3NZQ6GZA | 7.1 | |
| Баричев, Сергей Г. + Серов, Р.Е._Основы современной криптографии. ver 1.3.djvu | 457389 | 2016-10-10 17:32:27 +00:00 | W6VACBWRHQ34NKRWWKDNSQ4ISPMJ5QHF2NAW3MA | 7.5 | |
| В. И. Нечаев - Элементы криптографии. Основы теории защиты информации 1999.djvu | 6233744 | 2016-10-17 07:50:54 +00:00 | 6AWDK735CJ3IVOBKXTHW5SKPVUL5IFOIGG36RYA | 7.5 | |
| В.А. Мухачев, В.А. Хорошко - Методы практической криптографии 2005.djvu | 9435294 | 2016-11-11 12:47:42 +00:00 | AXOGFR5KOFB76UJJWOSCEIKT45WAUQA5ZEVZD2Y | 4.4 | |
| Вельшенбах М. - Криптография на Си и С++ в действии 2004.djvu | 20770929 | 2016-10-28 08:44:48 +00:00 | QJXHTOJKA5RJ45EWYABXZINKBOFAVX6SGZLNFMQ | 3.2 | |
| Коробейников А. Г, Ю.А.Гатчин. Математические основы криптологии. СПб, 2004. – 106 с, илл..pdf | 1097581 | 2016-11-12 12:07:45 +00:00 | NY4AALCPKU3CQEPHJNFXXV6XQDSCRW5XSMKCB7A | 3.2 | |
| Коробейников А.Г. - Математические основы криптографии [2002].pdf | 1079028 | 2016-11-29 04:55:38 +00:00 | 6GVW4PEEPA5IDQLDJLNMKF2M4HATQSGHWMVMYLQ | ||
| Н. Смарт - Криптография 2005.pdf | 8795078 | 2016-11-26 15:35:51 +00:00 | 5UADUX6WHGOXDPOEWJDKMWGHQAGO4YZ7GM2LK3Y | 3.2 | |
| Ростовцев А.Г., Маховенко Е.Б. - Теоретическая криптография (2005).djvu | 9978983 | 2016-12-01 19:44:30 +00:00 | EADACR5QONOXHCSNCRPNXNJR5LORTE5YUN2HSHA | ||
| Сидельников В.М. - Криптография и теория кодирования (2002)(ru).djvu | 1508631 | 2016-11-02 09:53:57 +00:00 | 4UHZAMJVQ5RG2YCYFLZBRI2BDVR4E7PYYS3YOWQ | 4.4 | |
| Терехов А.А. - Криптографическая защита информации (1999).pdf | 777797 | 2016-10-11 11:53:43 +00:00 | VH3GV66M7XZNXDXXNSEMFOPYRDIFBOWH5URPTHY | 7.1 | |
| Шнайер, Фергюсон - Практическая Криптография 2005.djvu | 17364750 | 2016-10-23 04:44:52 +00:00 | VQAJCVHC7YZKBXD3I3MWRLWIIJ6LDNYTEKXWNFA | 8.2 | |
| Щербаков А., Домашев А. - Прикладная криптография. Использование и синтез криптографических интерфейсов 2003.pdf | 48759238 | 2016-11-04 09:48:12 +00:00 | O4BCYQOFOIYBN24DJDJVDVQSLJVVNGTW7ZIL75Y | 3.2 | |
| Щербаков Л. Ю., Домашен А. В._Прикладная криптография. Использование и синтез криптографических интерфейсов.pdf | 48743379 | 2016-10-17 19:01:44 +00:00 | V2ACDTYGI665MCTWGDIU77HWORPIYECSBX4GLPA | 5.3 | |
| Ященко В.В. (ред.) - Введение в криптографию (2000)(ru).djvu | 2393118 | 2016-11-16 07:58:19 +00:00 | FRRHYK2HEZKBIWS7GI4YDXSER5ZUYWATIKHCRLQ | 3.2 |