Block Cipher

The Twofish Encryption Algorithm: A 128-Bit Block Cipher  eBooks & eLearning

Posted by JohnZulzman at Oct. 3, 2014
The Twofish Encryption Algorithm: A 128-Bit Block Cipher

The Twofish Encryption Algorithm: A 128-Bit Block Cipher
Wiley; 1 edition | ISBN: 0471353817 | 208 pages | CHM | March 22, 1999 | English | 0.61 Mb

The Block Cipher Companion (Information Security and Cryptography) (repost)  eBooks & eLearning

Posted by Veslefrikk at Aug. 12, 2014
The Block Cipher Companion (Information Security and Cryptography) (repost)

Lars R. Knudsen, "The Block Cipher Companion (Information Security and Cryptography)"
Publisher: Sp–er | ISBN 10: 3642173411 | 2011 | PDF | 281 pages | 3.4 MB

The Block Cipher Companion (Information Security and Cryptography) (Repost)  eBooks & eLearning

Posted by nebulae at Jan. 2, 2014
The Block Cipher Companion (Information Security and Cryptography) (Repost)

Lars R. Knudsen, "The Block Cipher Companion (Information Security and Cryptography)"
English | ISBN: 3642173411 | 2011 | PDF | 281 pages | 3 MB

The Block Cipher Companion (Information Security and Cryptography)  eBooks & eLearning

Posted by avava at Nov. 2, 2011
The Block Cipher Companion (Information Security and Cryptography)

Lars R. Knudsen, "The Block Cipher Companion (Information Security and Cryptography)"
Publisher: Sp–er | ISBN 10: 3642173411 | 2011 | PDF | 281 pages | 3.4 MB

Files Cipher 2.1  Software

Posted by big1ne at Oct. 21, 2016
Files Cipher 2.1

Files Cipher 2.1 | 3.8 MB

Files Cipher is a simple but powerful tool for protecting confidential information. The program uses an encryption algorithm with private key that was specially developed by FC Soft and has proven to be effective over many years of operation. Features include a wide scope of application, high performance rate and strong encryption. Due to a comfortable and intuitive interface, Files Cipher allows any user to protect data, even novices in information security.

Brugeas & Toulhoat - Block 109 : Étoile Rouge - One Shot - (re-up)  Comics

Posted by pinkpanther2 at Feb. 29, 2016
Brugeas & Toulhoat - Block 109 : Étoile Rouge - One Shot - (re-up)

Block 109 : Etoile Rouge - One Shot - (2010)
Scénario: Vincent Brugeas | Dessin: Ronan Toulhoat | Uchronie | PDF | French | 44MB

Alors que l'Allemagne nazie occupe l'Europe, Hitler est assassiné. L'opération Barbarossa n'a donc pas lieu à la date prévue le 22 Juin 1941 mais le 22 Juillet 1944. Pour épauler Staline, la France libre de De Gaulle lui envoie un fameux escadron de pilotes baptisé Normandie. Ils devront affronter les avions à réaction allemands en même temps que la politique soviétique.

Coursera - Cryptography [repost]  eBooks & eLearning

Posted by ParRus at Feb. 17, 2016
Coursera - Cryptography [repost]

Coursera - Cryptography
Dan Boneh, Professor, Stanford University
WEBRip | English | MP4 + PDF Slides | 960 x 540 | AVC ~19.3 kbps | 15 fps
AAC | 126 Kbps | 44.1 KHz | 2 channels | Subs: English (.srt) | ~15 hours | 1.02 GB
Genre: eLearning Video / Cryptography, Database, Security

Cryptography is an indispensable tool for protecting information in computer systems. This course explains the inner workings of cryptographic primitives and how to correctly use them. Students will learn how to reason about the security of cryptographic constructions and how to apply this knowledge to real-world applications.

SecureWord 2.0 Build 1501  Software

Posted by big1ne at Feb. 6, 2016
SecureWord 2.0 Build 1501

SecureWord 2.0 Build 1501 | 1.0 MB

SecureWord is a secure password manager (password keeper) program that uses Advanced Encryption Standard adopted by the US Government in 2002. Your data will always be safe and secure thanks to built-in protective measures. For example, the program automatically clears clipboard when you minimize or exit it. We use AES block cipher to protect your sensitive data with 256 bit key. CBC mode of AES cipher is used to hide internal data structure. Every time when you save the database, SecureWord regenerates IV (initialization vector) of AES cipher to hide the changes. PBKDF2 function is used to mix your password with 256 bit salt in 12000…65000 rounds to avoid brute force attacks.

Introduction to Cryptography with Coding Theory, 2nd Edition (repost)  eBooks & eLearning

Posted by arundhati at Oct. 27, 2015
Introduction to Cryptography with Coding Theory, 2nd Edition (repost)

Wade Trappe, Lawrence C. Washington, ''Introduction to Cryptography with Coding Theory, 2nd Edition''
English | 2005 | ISBN: 0131862391 | PDF | 592 pages | 13 MB

AxpertSoft PDF Encryption 1.4.5  Software

Posted by speedzodiac_ at Sept. 6, 2015
AxpertSoft PDF Encryption 1.4.5

AxpertSoft PDF Encryption | 7.25 MB
Included: Single User, Business, Site License

PDF Encryption is a way to protect your private and confidential data from unauthorized access. Following two methods are used to encrypt pdf data: RC4 (ARC4 or ARCFOUR assumed RC4) and AES (Advanced Encryption Standard)