![[ICO]](/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](/icons/back.gif) | Parent Directory | | - | |
![[DIR]](/icons/folder.gif) | cryptography & mathematics/ | 2023-08-25 22:25 | - | |
![[DIR]](/icons/folder.gif) | rfc/ | 2024-04-16 22:12 | - | |
![[ ]](/icons/layout.gif) | 1909.03951.pdf | 2020-04-19 23:11 | 0 | |
![[ ]](/icons/layout.gif) | CLP.11-v2.2-GSMA-IoT-Security-Guidelines-Overview-Document.pdf | 2020-05-18 22:41 | 0 | |
![[ ]](/icons/layout.gif) | SGP.21_v2.2.pdf | 2020-08-31 23:54 | 0 | |
![[ ]](/icons/layout.gif) | SGP.22-v2.2.2.pdf | 2020-08-31 23:46 | 0 | |
![[ ]](/icons/layout.gif) | sec4-1.0.pdf | 2015-01-29 22:45 | 315K | |
![[ ]](/icons/layout.gif) | Introduction%20to%20Privacy%20Enhancing%20Technologies.pdf | 2018-06-14 12:10 | 353K | |
![[ ]](/icons/layout.gif) | GBT_32918.2-2016..pdf | 2024-07-30 22:28 | 390K | |
![[ ]](/icons/layout.gif) | spaccs.pdf | 2019-05-26 13:09 | 412K | |
![[ ]](/icons/layout.gif) | GBT_32907-2016.pdf | 2024-07-30 22:27 | 420K | |
![[ ]](/icons/layout.gif) | Introduction%20to%20public%20key%20cryptography.pdf | 2018-06-11 22:03 | 452K | |
![[ ]](/icons/layout.gif) | 230-DNS-Past-Present-Future-FIRSTCON2019.pdf | 2019-06-19 19:57 | 559K | |
![[ ]](/icons/layout.gif) | secure-boot-and-image-authentication-technical-overview-v2-0.pdf | 2020-08-06 22:08 | 683K | |
![[ ]](/icons/layout.gif) | GBT_32905-2016.pdf | 2024-07-30 22:27 | 749K | |
![[ ]](/icons/layout.gif) | NIST.IR.8259-draft2.pdf | 2020-01-07 03:30 | 779K | |
![[ ]](/icons/layout.gif) | GBT_38629-2020.pdf | 2024-07-30 22:28 | 871K | |
![[ ]](/icons/layout.gif) | 8252-berec-report-on-the-location-of-the-netw_0.pdf | 2020-08-03 23:51 | 890K | |
![[ ]](/icons/layout.gif) | NIST.SP.800-207-draft2.pdf | 2020-02-12 23:05 | 922K | |
![[ ]](/icons/layout.gif) | GMT_0025-2014.pdf | 2024-07-30 22:33 | 1.0M | |
![[ ]](/icons/layout.gif) | NIST.CSWP.04162018.pdf | 2018-04-18 02:53 | 1.0M | |
![[ ]](/icons/layout.gif) | Introduction%20to%20elliptic%20curve%20cryptography.pdf | 2018-06-12 21:36 | 1.1M | |
![[ ]](/icons/layout.gif) | GBT_32918.4-2016.pdf | 2024-07-30 22:28 | 1.2M | |
![[ ]](/icons/layout.gif) | shafir2020-nxnsattack-paper.pdf | 2020-05-20 13:03 | 1.2M | |
![[ ]](/icons/layout.gif) | GMT_0033-2014.pdf | 2024-07-30 22:33 | 1.2M | |
![[ ]](/icons/layout.gif) | apple-platform-security-guide.pdf | 2020-04-09 04:33 | 1.2M | |
![[ ]](/icons/layout.gif) | GMT_0026-2014.pdf | 2024-07-30 22:33 | 1.3M | |
![[ ]](/icons/layout.gif) | GBT_32918.3-2016.pdf | 2024-07-30 22:28 | 1.4M | |
![[ ]](/icons/layout.gif) | GBT_33560-2017.pdf | 2024-07-30 22:28 | 1.5M | |
![[ ]](/icons/layout.gif) | Introduction%20to%20microarchitectural%20attacks.pdf | 2018-06-12 16:52 | 1.6M | |
![[ ]](/icons/layout.gif) | NIST%20Privacy%20Framework%20V1.0_Webinar_Deck-29Jan2020%20%28002%29.pdf | 2020-01-29 23:07 | 1.6M | |
![[ ]](/icons/layout.gif) | openssl-cookbook-3ed.pdf | 2023-02-27 20:54 | 1.8M | |
![[ ]](/icons/layout.gif) | NIST.SP.800-121r2.pdf | 2017-05-08 21:31 | 1.9M | |
![[ ]](/icons/layout.gif) | Introduction%20to%20symmetric%20crypto.pdf | 2018-06-11 22:03 | 2.6M | |
![[ ]](/icons/layout.gif) | NIST.CSWP.04012020-draft.pdf | 2020-03-31 22:31 | 2.6M | |
![[ ]](/icons/layout.gif) | GMT_0009-2012.pdf | 2024-07-30 22:28 | 2.6M | |
![[ ]](/icons/layout.gif) | GBT_38636-2020.pdf | 2024-07-30 22:28 | 2.6M | |
![[ ]](/icons/layout.gif) | Introduction%20to%20post-quantum%20cryptography%20and%20learning%20with%20errors.pdf | 2018-06-11 22:03 | 2.7M | |
![[ ]](/icons/layout.gif) | GMT_0010-2012.pdf | 2024-07-30 22:29 | 3.1M | |
![[ ]](/icons/layout.gif) | GMT_0016-2012.pdf | 2024-07-30 22:29 | 3.1M | |
![[ ]](/icons/layout.gif) | GBT_32918.1-2016...pdf | 2024-07-30 22:28 | 3.5M | |
![[ ]](/icons/layout.gif) | GMT_0060-2018.pdf | 2024-07-30 22:33 | 3.6M | |
![[ ]](/icons/layout.gif) | GBT_32918.5-2017.pdf | 2024-07-30 22:28 | 4.3M | |
![[ ]](/icons/layout.gif) | GMT_0015-2012.pdf | 2024-07-30 22:29 | 5.1M | |
![[ ]](/icons/layout.gif) | eu-17-Blanco-WI-FI-Direct-To-Hell-Attacking-WI-FI-Direct-Protocol-Implementations.pdf | 2018-05-12 01:27 | 5.1M | |
![[ ]](/icons/layout.gif) | OReilly.Command-Line.Rust.2022.1.pdf | 2023-02-27 20:54 | 5.5M | |
![[ ]](/icons/layout.gif) | OReilly.Practical.Cloud.Native.Security.with.Falco.2022.8.pdf | 2023-02-27 20:42 | 5.6M | |
![[ ]](/icons/layout.gif) | E21b-Romansky.pdf | 2017-09-06 21:33 | 5.7M | |
![[ ]](/icons/layout.gif) | Introduction%20to%20Authenticated%20Encryption.pdf | 2018-06-12 05:56 | 6.2M | |
![[ ]](/icons/layout.gif) | Crypto.Dictionary.2021.3.pdf | 2023-02-27 20:52 | 6.2M | |
![[ ]](/icons/layout.gif) | book.pdf | 2020-01-05 09:59 | 6.4M | |
![[ ]](/icons/layout.gif) | Hardware-assisted%20security.pdf | 2018-06-19 00:28 | 6.8M | |
![[ ]](/icons/layout.gif) | sec19_slides_stute.pdf | 2019-08-16 00:16 | 8.0M | |
![[ ]](/icons/layout.gif) | FPF_DPAStrategiesReport_05122020.pdf | 2020-05-12 20:16 | 8.2M | |
![[ ]](/icons/layout.gif) | GMT_0018-2012.pdf | 2024-07-30 22:30 | 8.2M | |
![[ ]](/icons/layout.gif) | SRS.pdf | 2020-04-08 12:45 | 8.9M | |
![[ ]](/icons/layout.gif) | GMT_0020-2012.pdf | 2024-07-30 22:33 | 9.3M | |
![[ ]](/icons/layout.gif) | GMT_0017-2012.pdf | 2024-07-30 22:30 | 9.3M | |
![[ ]](/icons/layout.gif) | sec19-stute.pdf | 2019-07-27 08:04 | 9.9M | |
![[ ]](/icons/layout.gif) | Wiley.Bruce.Schneier.on.Trust.Set.2014.1.pdf | 2023-02-27 20:41 | 11M | |
![[ ]](/icons/layout.gif) | GMT_0019-2012.pdf | 2024-07-30 22:32 | 11M | |
![[ ]](/icons/layout.gif) | GMT_0014-2012.pdf | 2024-07-30 22:29 | 12M | |
![[ ]](/icons/layout.gif) | Thinking.Security.2015.11.pdf | 2023-02-27 20:56 | 12M | |
![[ ]](/icons/layout.gif) | Privacy-preserving%20information%20sharing:%20cryptographic%20tools%20and%20applications.pdf | 2018-06-14 12:16 | 13M | |
![[ ]](/icons/layout.gif) | Proving%20Cryptographic%20Implementations%20Secure%20-%20Part%20I.pdf | 2018-06-15 00:26 | 13M | |
![[ ]](/icons/layout.gif) | OReilly.Identity.and.Data.Security.for.Web.Development.2016.6.pdf | 2021-04-11 10:12 | 13M | |
![[ ]](/icons/layout.gif) | Foundations.of.Information.Security.2019.10.pdf | 2023-02-27 20:50 | 17M | |
![[ ]](/icons/layout.gif) | BonehShoup_0_4.pdf | 2017-10-02 14:34 | 25M | |
![[ ]](/icons/layout.gif) | ble_Core_v5.1.pdf | 2022-09-08 20:59 | 28M | |
![[ ]](/icons/layout.gif) | Manning.Real-World.Cryptography.MEAP.Edition.Version.12.2021.pdf | 2023-02-27 20:53 | 31M | |
![[ ]](/icons/layout.gif) | Real-World.Android.by.Tutorials.2nd.pdf | 2022-11-10 22:43 | 58M | |
|