Index of /n/cryptography and algorythms/

NameLast ModifiedSizeType
Parent Directory/ -  Directory
(eBook) - Cryptography - RSA Encryption Algorithm in a Nut Shell.pdf2006-Dec-28 06:47:46392.2Kapplication/pdf
Applied Cryptology.Cryptographic Protocols.Computer Security Models.pdf2006-Dec-28 06:47:486.4Mapplication/pdf
Cambridge University Press - Advances In Elliptic Curve Cryptography (2005).pdf2006-Dec-28 06:47:494.6Mapplication/pdf
Computer Science - Data Mining Tutorial.pdf2006-Dec-28 06:47:412.8Mapplication/pdf
Computer Science - Mit Press - Principles Of Data Mining.pdf2006-Dec-28 06:47:373.7Mapplication/pdf
Cryptographic Security Architecture Design and Verification (2004).pdf2006-Dec-28 06:47:392.7Mapplication/pdf
Data Mining, Practical Machine Learning Tools and Techniques 2nd.Ed (Morgan Kaufmann 2005)WEKA.pdf2006-Dec-28 06:47:517.7Mapplication/pdf
Practical Cryptography.pdf2006-Dec-28 06:47:46614.2Kapplication/pdf
Prentice Hall - Modern Cryptography - Theory and Practice - 2003 ! - (By Laxxuss).pdf2006-Dec-28 06:47:4417.8Mapplication/pdf
Prentice,.Cryptography.and.Network.Security.Principles.and.Practices.(2005),.4Ed.BBL.LotB.chm2006-Dec-28 06:47:4612.4Mchemical/x-chemdraw
Springer,.Guide.to.Elliptic.Curve.Cryptography.(2004).kB.pdf2006-Dec-28 06:47:484.3Mapplication/pdf
[eBook] Real-Time Design Patterns - Robust Scalable Architecture for Real-Time Systems (Addison Wesley).pdf2006-Dec-28 06:47:406.6Mapplication/pdf
basic_cryptanalysis_techniques - Smith.pdf2006-Dec-28 06:47:46661.5Kapplication/pdf
cryptology - applied cryptography 2ed - wiley.pdf2006-Dec-28 06:47:372.9Mapplication/pdf
none - Data Mining, An Overview From Database Perspective.pdf2006-Dec-28 06:47:382.1Mapplication/pdf
lighttpd/1.4.35