A. Menezes - Handbook of Applied Cryptography
Adam Young - Exposing Cryptovirology 2004.pdf
Arto Salomaa - Open-Key Cryptography, Rus.pdf
Bruce Schneier - Applied Cryptography - Second Edition.chm
Bruce Schneier - Applied Cryptography, 2nd ed.pdf
Bruce Schneier - Applied Cryptography, Protocols, Algorithms, and Source Code in C, Second Ed.pdf
Bruce Schneier - Applied Cryptography, Second Edition-Protocols, Algorithms and Source Code in C - Bruce Schneier.pdf
Coding and Cryptography.pps
D. Naccache - Cryptography and Copy Protection, Lecture.pdf
Derek Atkins - Internet Security Professional Reference, Second Edition.chm
Douglas Stinson - Cryptography, Theory and Practice.chm
Eli Biham - Magenta encryption algorithm.pdf
Harold Tipton - Handbook of Information Security Management, 1999 Edition.chm
Harold Tipton - Handbook of Information Security Management.chm
Ian F. Blake - Advances In Elliptic Curve Cryptography.pdf
Jason Weiss - Java Cryptography Extensions.pdf
Jeff Thompson - Monoalphabetic Cryptanalysis.txt
Kenneth H. Rosen - An Introduction To Cryptography 2nd Edition.pdf
Kil-Hyun Nam - Information Security and Cryptology.com.pdf
Nik Goots - Modern Cryptography, Protect Your Data with Fast Block Ciphers.chm
Numerical Recipes - Ch. 7.5 Random Sequences Based on Data Encryption.pdf
R. Sjerov - Osnovy Sovremennoj Kriptografii(RUS).djvu
Rrsa labs - Faq about cryptography 41.pdf
S Koutichno - Rsa (ru).pdf
The Elliptic Curve Digital Signature Algorithm, Standard.pdf
Tilborg - Cryptography (ru)
Thomas R.Peltier - Information Security Policies and Procedures.chm
W Nieczajew - Element kriptog (ru).djvu
W. Jaszczenko - Cryptography (ru).pdf
Whitfield D. - Privacy on the Line. The Politics of Wiretapping and Encryption.pdf
Z. Brassard-Kripto (ru).djvu
All: (230MB)
passwd:
Adam Young - Exposing Cryptovirology 2004.pdf
Arto Salomaa - Open-Key Cryptography, Rus.pdf
Bruce Schneier - Applied Cryptography - Second Edition.chm
Bruce Schneier - Applied Cryptography, 2nd ed.pdf
Bruce Schneier - Applied Cryptography, Protocols, Algorithms, and Source Code in C, Second Ed.pdf
Bruce Schneier - Applied Cryptography, Second Edition-Protocols, Algorithms and Source Code in C - Bruce Schneier.pdf
Coding and Cryptography.pps
D. Naccache - Cryptography and Copy Protection, Lecture.pdf
Derek Atkins - Internet Security Professional Reference, Second Edition.chm
Douglas Stinson - Cryptography, Theory and Practice.chm
Eli Biham - Magenta encryption algorithm.pdf
Harold Tipton - Handbook of Information Security Management, 1999 Edition.chm
Harold Tipton - Handbook of Information Security Management.chm
Ian F. Blake - Advances In Elliptic Curve Cryptography.pdf
Jason Weiss - Java Cryptography Extensions.pdf
Jeff Thompson - Monoalphabetic Cryptanalysis.txt
Kenneth H. Rosen - An Introduction To Cryptography 2nd Edition.pdf
Kil-Hyun Nam - Information Security and Cryptology.com.pdf
Nik Goots - Modern Cryptography, Protect Your Data with Fast Block Ciphers.chm
Numerical Recipes - Ch. 7.5 Random Sequences Based on Data Encryption.pdf
R. Sjerov - Osnovy Sovremennoj Kriptografii(RUS).djvu
Rrsa labs - Faq about cryptography 41.pdf
S Koutichno - Rsa (ru).pdf
The Elliptic Curve Digital Signature Algorithm, Standard.pdf
Tilborg - Cryptography (ru)
Thomas R.Peltier - Information Security Policies and Procedures.chm
W Nieczajew - Element kriptog (ru).djvu
W. Jaszczenko - Cryptography (ru).pdf
Whitfield D. - Privacy on the Line. The Politics of Wiretapping and Encryption.pdf
Z. Brassard-Kripto (ru).djvu
All: (230MB)
passwd:
Kod: Zaznacz cały
joe77joe77Kod: Zaznacz cały
http://freakshare.com/files/g2oqh66v/crypt.zip.html