• Онлайн: 2
biblio/kolxoz/cs/cscr.txt · Последнее изменение: 09.09.2023 16:30 — nozdr
Криптография
- "ACM. Issue of Comm. ACM Sept. 2003, vol. 46, no. 9(T)(C)(249s).djvu" (3.6М)
- "Adamenko M.V. Osnovy klassicheskoj kriptologii. Sekrety shifrov i kodov (DMK, 2012)(ru)(ISBN 9785940744566)(K)(T)(256s)_CsCr_.djvu" (2.3М)
- "Agranovskij A.V., Hadi R.A. Prakticheskaya kriptografiya (Solon-Press, 2009)(ISBN 5980030026)(ru)(600dpi)(T)(S)(254s)_CsCr_.djvu" (5.6М)
- "Agranovskij A.V., i dr. Steganografiya, cifrovye vodyanye znaki i steganoanaliz (VK, 2009)(ru)(ISBN 9785950204012)(K)(T)(217s)_CsCr_.djvu" (3.0М)
- "Alferov A.P., i dr. Osnovy kriptografii (2izd., Gelios ARV, 2002)(ISBN 5854380250)(600dpi)(ru)(T)(S)(481s)_CsCr_.djvu" (5.7М)
- "Arshinov M.N., Sadovskij L.E. Kody i matematika. Rasskazy o kodirovanii (B-ka Kvant 30, Nauka, 1983)(ru)(T)(145s).djvu" (2.4М)
- "Asoskov A.V., i dr. Potochnye shifry (Kudic, 2003)(ru)(ISBN 5933780782)(600dpi)(T)(336s)_CsCr_.djvu" (3.2М)
- "Babash A.V., Shankin G.A. Kriptografiya (Solon, 2007)(ru)(ISBN 5934551353)(600dpi)(K)(T)(513s)_CsCr_.djvu" (7.9М)
- "Baigneres T., et al. A Classical Introduction to Cryptography Exercise Book (Springer, 2006)(ISBN 0387279342)(T)(O)(S)(262s)_CsCr_.djvu" (1.7М)
- "Baldoni, Ciliberto, Cattaneo. Elementary number theory, cryptography and codes (Springer, 2009)(ISBN 3540691995)(530s)_CsCr_.pdf" (2.8М)
- "Barichev S.G., Serov R.E. Osnovy sovremennoj kriptografii (Goryachaya Liniya - Telekom, 2002)(ISBN 5935170752)(ru)(T)(S)(153s)_CsCr_.djvu" (913.5К)
- "Barichev, Serov. Osnovy sovremennoj kriptografii (2002) (ru)(L)(T)(76s).djvu" (763.8К)
- "Beissinger J., Pless V. The Cryptoclub.. Using Mathematics to Make and Break Secret Codes (AKPeters, 2006)(ISBN 156881223X)(T)(214s)_CsCr_.djvu" (5.5М)
- "Beissinger J., Pless V. The Cryptoclub.. Using Mathematics to Make and Break Secret Codes.. Workbook (AKPeters, 2006)(ISBN 156881223X)(600dpi)(T)(144s)_CsCr_.djvu" (1.4М)
- "Biggs N. Codes.. An introduction to information communication and cryptography (Springer, 2008)(ISBN 1848002726)(278s)_CsCr_.pdf" (1.9М)
- "Biggs N. Codes.. An introduction to information communication and cryptography (UMS, Springer, 2008)(ISBN 1848002726)(O)(279s)_CsCr_.pdf" (1.9М)
- "Blahut R.E. Algebraic Codes on Lines, Planes, and Curves (CUP, 2008)(ISBN 0521771943)(567s)_CsCr_.pdf" (2.9М)
- "Blake I., Seroussi G., Smart N., Cassels J.W.S. (eds.) Elliptic curves in cryptography (CUP, 1999)(ISBN 0521653746)(600dpi)(T)(218s)_CsCr_.djvu" (1.3М)
- "Blake I., Seroussi G., Smart N., Cassels J.W.S. (eds.) Elliptic curves in cryptography (CUP, 1999)(ISBN 0521653746)(T)(218s)_CsCr_.djvu" (1.2М)
- "Bloch M., Barros J. Physical-Layer Security (CUP, 2011)(ISBN 9780521516501)(O)(345s)_CsCr_.pdf" (1.5М)
- "Bolotov A.A., i dr. E'lementarnoe vvedenie v e'llipticheskuyu kriptografiyu 1 (KomKniga, 2006)(ISBN 5484004438)(ru)(600dpi)(T)(S)(325s)_CsCr_.djvu" (5.5М)
- "Bolotov A.A., i dr. E'lementarnoe vvedenie v e'llipticheskuyu kriptografiyu 2 (KomKniga, 2006)(ISBN 5484004446)(ru)(600dpi)(T)(S)(275s)_CsCr_.djvu" (4.9М)
- "Brands S.A. Rethinking public key infrastructures and digital certificates (MIT, 2000)(ISBN 0262024918)(O)(338s)_CsCr_.pdf" (1.2М)
- "Brassar Zh. (_Brassard_) Sovremennaja kriptologija (1999)(ru)(T)(178s).djvu" (2.1М)
- "Buchmann J. Introduction to cryptography (2ed., Springer, 2004)(ISBN 0387207562)(600dpi)(T)(O)(354s)_CsCr_.djvu" (2.1М)
- "Buchmann J. Introduction to cryptography (2pr., UTM, Springer, 2002)(ISBN 0387950346)(T)(S)(O)(296s)_CsCr_.djvu" (1.8М)
- "Buchmann J.A. Introduction to cryptography (Springer, 2002)(ISBN 0387950346)(KA)(T)(296s)_CsCr_.djvu" (1.6М)
- "Burnett S., Paine S. RSA Security's official guide to cryptography (Osborne MGH, 2001)(ISBN 007213139X)(O)(449s)_CsCr_.pdf" (7.8М)
- "Cheremushkin A.V. Kriptograficheskie protokoly. Osnovnye svojstva i uyazvimosti (Akademiya, 2009)(ru)(ISBN 9785769557484)(T)(272s)_CsCr_.djvu" (1.8М)
- "Cohen H., Frey G., et al. Handbook of elliptic and hyperelliptic curve cryptography (CRC, 2006)(ISBN 1584885181)(843s)_CsCr_.pdf" (5.4М)
- "Curtin M. Brute force.. Cracking the Data Encryption Standard (Copernicus Books, 2005)(ISBN 0387201092)(O)(283s)_CsCr_.pdf" (1.4М)
- "Cusick T.W., Ding C., Renvall A. Stream Ciphers and Number Theory (Elsevier, 2004)(ISBN 044451631X)(T)(O)(470s)_CsCr_.djvu" (2.6М)
- "Damgard I. Lectures on data security.. Modern cryptology in theory and practice (LNCS1561, Springer, 1999)(ISBN 3540657576)(255s)_CsCr_.pdf" (3.1М)
- "Denis T.S. Cryptography for developers (Syngress, 2007)(ISBN 1597491047)(O)(449s)_CsCr_.pdf" (2.0М)
- "Denis T.S., Rose G. BigNum Math.. Implementing Cryptographic Multiple Precision Arithmetic (Syngress Pub., 2006)(ISBN 1597491128)(315s)_CsCr_.pdf" (1.6М)
- "Dent A.W., Mitchell C.J. User's guide to cryptography and standards (Artech, 2004)(ISBN 1580535305)(399s)_CsCr_.pdf" (1.6М)
- "Diehl E. Securing digital video.. techniques for DRM and content protection (Springer, 2012)(ISBN 9783642173448)(O)(267s)_CsCr_.pdf" (2.3М)
- "Dorichenko S.A., Yashchenko V.V. 25 e#tyudov o shifrax (Teis, 1994)(ISBN 5721800143)(ru)(400dpi)(T)(72s)_CsCr_.djvu" (1.2М)
- "Dorichenko S.A., Yashchenko V.V. 25 e'tyudov o shifrax (TEIS, 1994)(ISBN 5721800143)(ru)(600dpi)(T)(S)(74s)_CsCr_.djvu" (998.6К)
- "Dube R.R. Hardware-based computer security techniques to defeat hackers (Wiley, 2008)(ISBN 0470193395)(T)(S)(254s)_CsCr_.djvu" (2.6М)
- "Enge A. Elliptic curves and their applications to cryptography (Kluwer, 1999)(ISBN 0792385896)(T)(S)(175s)_CsCr_.djvu" (1.5М)
- "Fomichev V.M. Diskretnaya matematika i kriptologiya (Dialog-MIFI, 2003)(ISBN 5864041858)(ru)(600dpi)(T)(S)(398s)_CsCr_.djvu" (3.2М)
- "Fomichev V.M. Diskretnaya matematika i kriptologiya.. Kurs lekcij (Dialog-MIFI, 2003)(ISBN 5864041858)(ru)(T)(S)(398s)_CsCr_.djvu" (2.9М)
- "Friedman W.F. Military cryptanalysis, parts 1,2,3,4 (1996)(ISBN 0894120441)(T)(O)(649s)_CsCr_.djvu" (8.7М)
- "Gabidulin E'.M., Ksheveckij A.S., Kolybel'nikov A.I. Zashchita informacii (MFTI, 2011)(ru)(O)(255s)_CsCr_.pdf" (2.0М)
- "Gaines H.F. Cryptanalysis.. a study of cyphers and their solution (Dover, 1956)(ASIN B0007DURTO)(KA)(200dpi)(T)(262s)_CsCr_.djvu" (3.5М)
- "Garrett P. Making, breaking codes (PH, 2001)(ISBN 0130303690)(KA)(T)(542s)_CsCr_.djvu" (4.5М)
- "Garrett P. Making, breaking codes.. an introduction to cryptology (PH, 2001)(ISBN 0130303690)(K)(600dpi)(T)(542s)_CsCr_.djvu" (12.0М)
- "Garrett P. The Mathematics of Coding Theory (PH, 2003)(ISBN 9780131019676)(T)(409s)_CsCr_.djvu" (3.0М)
- "Gatchin Yu.A., Korobejnikov A.G. Osnovy kriptograficheskix algoritmov (SPb-GITMO, 2002)(ru)(29s)_CsCr_.pdf" (318.6К)
- "Goldreich O. Foundations of cryptography. Vol.1, Basic tools (CUP, 2001)(ISBN 0521791723)(393s)_CsCr_.pdf" (2.2М)
- "Goldreich O. Foundations of cryptography. Vol.1, Basic tools (CUP, 2001)(ISBN 9780521791724)(O)(393s)_CsCr_.pdf" (1.9М)
- "Goldreich O. Modern cryptography, probabilistic proofs and pseudorandomness (Springer, 1998)(ISBN 354064766X)(K)(T)(O)(199s)_CsCr_.djvu" (1.6М)
- "Golomb S.W., Gong G. Signal design for good correlation (CUP, 2005)(ISBN 0521821045)(T)(S)(458s)_CsCr_.djvu" (3.0М)
- "Gutmann P. Cryptographic security architecture (Springer, 2004)(ISBN 0387953876)(O)(339s)_CsCr_.pdf" (1.6М)
- "Hankerson, Menezes, Vanstone. Guide to elliptic curve cryptography (Springer, 2004)(ISBN 038795273X)(332s)_CsCr_.pdf" (2.7М)
- "Harin Yu.S., Bernik V.I., Matveev G.V. Matematicheskie osnovy kriptologii (BGU, 1999)(ISBN 9854452174)(ru)(T)(S)(320s)_CsCr_.djvu" (3.3М)
- "Hershey J. Cryptography Demystified (MGH, 2002)(ISBN 9780071406383)(T)(345s)_CsCr_.djvu" (6.7М)
- "Ho T., Lun D.S. Network coding.. An introduction (CUP, 2008)(ISBN 052187310X)(O)(184s)_CsCr_.pdf" (991.5К)
- "Hoffstein J., Pipher J., Silverman J. An introduction to mathematical cryptography (Springer, 2008)(ISBN 0387779930)(O)(533s)_CsCr_.pdf" (2.6М)
- "Hoffstein, Pipher, Silverman. An introduction to mathematical cryptography (Springer, 2008)(ISBN 0387779930)(533s)_CsCr_.pdf" (3.6М)
- "Jafarkhani H. Space-time coding (CUP, 2005)(ISBN 0521842913)(O)(320s)_CsCr_.pdf" (1.6М)
- "Jager T. Black-Box Models of Computation in Cryptology (Vieweg, 2012)(ISBN 9783834819895)(O)(91s)_CsCr_.pdf" (523.2К)
- "Jashchenko V. (red.) Vvedenie v kriptografiju (3izd., MCNMO, CHeRo, 2000)(ru)(288s)_CsCr_.pdf" (1.8М)
- "Jashchenko V. (red.) Vvedenie v kriptografiju (ru)(T)(271s).djvu" (2.4М)
- "Joux A. Algorithmic Cryptanalysis (CRC, 2009)(ISBN 1420070029)(O)(500s)_CsCr_.pdf" (2.4М)
- "Joye M., Tunstall M. (eds.) Fault Analysis in Cryptography (Springer, 2012)(ISBN 9783642296550)(O)(352s)_CsCr_.pdf" (4.1М)
- "Joyner D. Coding theory and cryptography.. From Enigma and Geheimschreiber to quantum theory (no TOC)(Springer, 2000)(ISBN 3540663363)(O)(261s)_CsCr_.pdf" (2.5М)
- "Kabatiansky G., Krouk E., Semenov S. Error correcting coding and security for data networks (Wiley, 2005)(ISBN 047086754X)(290s)_CsCr_.pdf" (2.6М)
- "Katz J. Digital Signatures (Springer, 2010)(ISBN 0387277110)(O)(197s)_CsCr_.pdf" (1.4М)
- "Katz J., Lindell Y. Introduction to Modern Cryptography.. Principles and Protocols (CRC, 2007)(ISBN 9781584885511)(T)(C)(O)(553s)_CsCr_.djvu" (10.9М)
- "Kazarin O.V. Teoriya i praktika zashchity programm (Moskva, 2004)(ru)(O)(388s)_CsCr_.pdf" (1.9М)
- "Knudsen J. Java Cryptography (O'Reilly, 1998)(ISBN 1565924029)(O)(254s)_CsCr_.pdf" (1.4М)
- "Knudsen J. Java Cryptography.. Source code (O'Reilly, 1998)(ISBN 1565924029)_CsCr_.zip" (146.8К)
- "Koblic N. Kurs teorii chisel i kriptografii (2001)(ru)(T)(269s).djvu" (3.1М)
- "Koblitz N. Algebraic aspects of cryptography (ACM0003, Springer, 1998)(ISBN 3540634460)(600dpi)(T)(S)(219s)_CsCr_.djvu" (2.1М)
- "Koblitz N. Algebraic aspects of cryptography (Algorithms and Computation in Mathematics 3. Springer, 1998)(600dpi)(L)(T)(109s)_CsCr_.djvu" (2.5М)
- "Koc C.K. (ed.) Cryptographic engineering (Springer, 2008)(ISBN 0387718168)(O)(528s)_CsCr_.pdf" (8.5М)
- "Koerner T.W. Coding and cryptography (draft, 1998)(600dpi)(T)(62s)_CsCr_.djvu" (376.6К)
- "Kranakis E. Primality and cryptography (Wiley, 1986)(ISBN 0471909343)(600dpi)(T)(250s)_CsCr_.djvu" (1.7М)
- "Levin M. __PGP__.. kodirovanie i shifrovanie informacii s otkrytym klyuchom (Buk-Press, 2006)(ISBN 5901321057)(ru)(L)(83s)_CsCr_.pdf" (253.1К)
- "Lian S. Multimedia Content Encryption (Auerbach Pub., 2008)(ISBN 1420065270)(O)(238s)_CsCr_.pdf" (5.7М)
- "Ling S., Xing C. Coding theory (CUP, 2004)(ISBN 0521529239)(236s)_CsCr_.pdf" (1.3М)
- "Loepp S., Wootters W.K. Protecting Information.. From Classical Error Correction to Quantum Cryptography (CUP, 2006)(ISBN 9780521827409)(305s)_CsCr_.pdf" (1.0М)
- "Logachyov O.A., Sal'nikov A.A., Yashchenko V.V. Bulevy funkcii v teorii kodirovaniya i kriptologii (MCNMO, 2004)(ISBN 5940571174)(ru)(600dpi)(T)(S)(470s)_CsCr_.djvu" (3.8М)
- "Mahovenko E.B. Teoretiko-chislovye metody v kriptografii (Gelios, 2006)(ISBN 5854381435)(ru)(600dpi)(K)(T)(322s)_CsCr_.djvu" (2.9М)
- "Martin L. Introduction to identity-based encryption (Artech house, 2008)(ISBN 9781596932388)(O)(244s)_CsCr_.pdf" (957.8К)
- "Martinez-moro E., Ruano D. Advances in algebraic geometry codes (WS, 2008)(ISBN 981279400X)(453s)_CsCr_.pdf" (2.1М)
- "Menezes A., van Oorschot P., Vanstone S. Handbook of applied cryptography (CRC, 1997)(T)(746s)_CsCr_.djvu" (6.6М)
- "Mineev M.P., Chubarikov V.N. Lekcii po arifmeticheskim voprosam kriptografii (MGU, 2010)(ru)(T)(187s)_CsCr_.djvu" (961.3К)
- "Moldovyan N., Moldovyan A. Innovative Cryptography (2ed., Charles River Media, 2006)(ISBN 1584504676)(O)(401s)_CsCr_.pdf" (6.4М)
- "Moldovyan N.A. Teoreticheskij minimum i algoritmy cifrovoj podpisi (BXV, 2010)(ru)(ISBN 9785977505857)(600dpi)(T)(O)(306s)_CsCr_.djvu" (4.2М)
- "Moldovyan N.A., Moldovyan A.A. Vvedenie v kriptosistemy s otkrytym klyuchom (BXV-Peterburg, 2005)(ISBN 5941575637)(ru)(600dpi)(T)(S)(287s)_CsCr_.djvu" (4.2М)
- "Mollin R. Codes.. The guide to secrecy from ancient to modern times (CRC, 2005)(ISBN 1584884703)(700s)_CsCr_.pdf" (4.2М)
- "Mollin R. RSA and public-key cryptography (CRC, 2003)(ISBN 1584883383)(275s)_CsCr_.pdf" (1.4М)
- "Mollin R. RSA and public-key cryptography (CRC, 2003)(ISBN 1584883383)(O)(275s)_CsCr_.pdf" (1.4М)
- "Mollin R.A. An introduction to cryptography (2ed., CRC, 2007)(ISBN 1584886188)(O)(394s)_CsCr_.pdf" (2.4М)
- "Muhachev V.A., Horoshko V.A. Metody prakticheskoj kriptografii (Kiev, 2005)(ISBN 966844048X)(ru)(T)(S)(209s)_CsCr_.djvu" (2.1М)
- "Myasnikov A., Shpilrain V., Ushakov A. Group-based cryptography (Birkhauser, 2008)(ISBN 3764388269)(191s)_CsCr_.pdf" (2.3М)
- "Obaidat M., Boudriga N. Security of e-systems and computer networks (CUP, 2007)(ISBN 0521837642)(O)(377s)_CsCr_.pdf" (1.5М)
- "Osipyan V.O., Osipyan K.V. Kriptografiya v zadachax i uprazhneniyax (Gelios, 2004)(ru)(ISBN 5854380099)(T)(146s)_CsCr_.djvu" (1.2М)
- "Paar C., Pelzl J. Understanding Cryptography (Springer, 2009)(ISBN 3642041000)(O)(382s)_CsCr_.pdf" (3.4М)
- "Panasenko S. Algoritmy shifrovaniya (BXV-Peterburg, 2009)(ISBN 9785977503198)(ru)(600dpi)(T)(578s)_CsCr_.djvu" (9.1М)
- "Peltier T.R., et al. Information security fundamentals (Auerbach Pub., 2005)(ISBN 0849319579)(O)(261s)_CsCr_.pdf" (4.7М)
- "Petrov A.A. Komp'yuternaya bezopasnost'.. Kriptograficheskie metody zashchity (DMK, 2000)(ISBN 5898180648)(ru)(400dpi)(T)(S)(449s)_CsCr_.djvu" (6.5М)
- "Polyanskaya O.Yu., Gorbatov V.S. Osnovy texnologii __PKI__ (Goryachaya Liniya - Telekom, 2004)(ISBN 5935171546)(ru)(248s)_CsCr_.pdf" (1.7М)
- "Pticyn N. Prilozhenie teorii determinirovannogo xaosa v kriptografii (2002)(ru)(O)(81s)_CsCr_.pdf" (2.3М)
- "Rao K.R., Yip P.C. (eds.) The transform and data compression handbook (CRC, 2001)(ISBN 0849336929)(O)(399s)_CsCr_.pdf" (8.3М)
- "Rhee M.Y. Internet security (Wiley, 2003)(ISBN 0470852852)(O)(426s)_CsCr_.pdf" (1.8М)
- "Rodriguez-Henriquez F., et al. Cryptographic algorithms on reconfigurable hardware (Springer, 2006)(ISBN 0387338837)(T)(O)(S)(384s)_CsCr_.djvu" (3.7М)
- "Romanec Yu.V., Timofeev P.A., Shan'gin V.F. Zashchita informacii v komp'yuternyx sistemax i setyax (RiS, 2001)(ISBN 5256015184)(ru)(T)(S)(380s)_CsCr_.djvu" (3.1М)
- "Rostovcev A.G., Mahovenko E.B. Teoreticheskaya kriptografiya (Professional, 2005)(ISBN 5943650125)(ru)(T)(S)(486s)_CsCr_.djvu" (10.5М)
- "Rothe J. Complexity theory and cryptology. An introduction to cryptocomplexity (Springer, 2005)(ISBN 3540221476)(O)(494s)_CsCr_.pdf" (2.7М)
- "Ryabko B., Fionov A. Basics of contemporary cryptography for IT practitioners (WS, 2005)(ISBN 9812564055)(O)(208s)_CsCr_.pdf" (2.6М)
- "Ryabko B., Fionov A. Kriptograficheskie metody zashchity informacii (MTU-NET, 2005)(600dpi)(ru)(T)(S)(229s)_CsCr_.djvu" (2.2М)
- "Ryabko B., Fionov A. Osnovy sovremennoj kriptografii (Nauchnyj Mir, 2004)(ru)(600dpi)(T)(S)(171s)_CsCr_.djvu" (3.4М)
- "Ryabko B.Ya., Fionov A.N. Osnovy sovremennoj kriptografii dlya specialistov v informacionnyx texnologiyax (Nauchnyj Mir, 2004)(ISBN 5891762331)(ru)(T)(S)(171s)_CsCr_.djvu" (2.3М)
- "Sala M., et al. (eds.) Groebner bases, coding, and cryptography (Springer, 2009)(ISBN 3540938052)(426s)_CsCr_.pdf" (4.6М)
- "Sarshar N., Wu X., Wang J., Dumitrescu S. Network-aware Source Coding and Communication (CUP, 2011)(ISBN 9780521888400)(O)(187s)_CsCr_.pdf" (1.8М)
- "Seberry J., Pieprzyk J. Cryptography.. An introduction to computer security (no front)(draft, PH, 1988)(ISBN 0131949861)(1200dpi)(T)(674s)_CsCr_.pdf" (2.9М)
- "Shaska, Huffman, Joyner. (eds.) Advances in coding theory and crytography (WS, 2007)(ISBN 9812707018)(267s)_CsCr_.pdf" (1.6М)
- "Sidel#nikov V.M. Stat#i po kriptografii (ru)(200dpi)(128s).djvu" (992.0К)
- "Sidel#nikov V.M. Stat#i po kriptografii (ru)(200dpi)(T)(128s).djvu" (1.5М)
- "Singh S. (_Singh S._) Kniga shifrov.. Tajnaya istoriya shifrov i ix rasshifrovki (AST, 2007)(ISBN 9785170384778)(ru)(T)(K)(O)(600dpi)(450s)_CsCr_.djvu" (8.8М)
- "Singh S. The code book.. How to make it, break it, hack it, crack it, for young people (Delacorte, 2001)(ISBN 0385730624)(O)(273s)_CsCr_.pdf" (1.9М)
- "Sinkov A. Elementary cryptanalysis.. A mathematical approach (MAA, 1966)(ISBN 0883856220)(600dpi)(T)(231s)_CsCr_.djvu" (2.2М)
- "Smart N. (_Smart N._) Kriptografiya (Texnosfera, 2005)(ISBN 5948360431)(600dpi)(ru)(T)(S)(529s)_CsCr_.djvu" (5.3М)
- "Smart N. Cryptography.. An introduction (3ed., MGH, 2010)(ISBN 0077099877)(434s)_CsCr_.pdf" (2.3М)
- "Smart N. Kriptografiya (Texnosfera, 2005)(ru)(529s)_CsCr_.pdf" (8.5М)
- "Smit R.E'. (_Smith_) Autentikaciya.. Ot parolej do otkrytyx klyuchej (Vil'yams, 2002)(ISBN 5845903416)(ru)(T)(S)(424s)_CsCr_.djvu" (6.2М)
- "Soboleva T. Istoriya shifroval'nogo dela v Rossii (Olma, 2002)(ru)(ISBN 5224036348)(600dpi)(T)(527s)_CsCr_.djvu" (8.8М)
- "Stamp M., Low R.M. Applied cryptanalysis.. Breaking ciphers in the real world (Wiley, 2007)(ISBN 047011486X)(O)(T)(S)(425s)_CsCr_.djvu" (3.8М)
- "Stamp M., Low R.M. Applied cryptanalysis.. breaking ciphers in the real world (Wiley, 2007)(ISBN 047011486X)(T)(O)(425s)_CsCr_.djvu" (3.1М)
- "Stinson D.R. Cryptography.. Theory and practice (3ed., CRC, 2006)(ISBN 1584885084)(T)(K)(611s)_CsCr_.djvu" (3.0М)
- "Sutherland D., Koltko-Rivera M. Cracking Codes and Cryptograms For Dummies (For Dummies, 2009)(ISBN 0470591005)(O)(339s)_CsCr_.pdf" (4.7М)
- "Tao R. Finite Automata and Application to Cryptography (Springer, 2009)(ISBN 3540782567)(411s)_CsCr_.pdf" (2.5М)
- "Thomas S.A. SSL and TLS essentials.. Securing the Web (Wiley, 2000)(ISBN 0471383546)(212s)_CsCr_.pdf" (977.2К)
- "Trappe W., Washington L.C. Introduction to cryptography with coding theory (PH, 2002)(ISBN 0130618144)(T)(K)(600dpi)(487s)_CsCr_.djvu" (2.9М)
- "Van Tilborg H., Jajodia S. (eds.) Encyclopedia of cryptography and security (2ed., Springer, 2011)(ISBN 9781441959058)(O)(1457s)_CsCr_.pdf" (20.5М)
- "Vaudenay S. A classical introduction to modern cryptography (Springer, 2006)(ISBN 0387254641)(343s)_CsCr_.pdf" (1.4М)
- "Verner M. (_Werner_) Osnovy kodirovaniya (Texnosfera, 2004)(ISBN 5948360199)(ru)(K)(T)(O)(284s)_CsCr_.djvu" (2.9М)
- "Vorozhcov A. Pomexoustojchivoe kodirovanie.. Metodicheskoe posobie (MFTI, 2001)(ru)(30s)_CsCr_.pdf" (272.9К)
- "Wade G. Signal Coding and Processing (2ed., CUP, 1994)(ISBN 9780521412308)(T)(O)(C)(455s)_CsCr_.djvu" (3.1М)
- "Wagner N.R. The laws of cryptography with Java code (draft, 2003)(338s)_CsCr_.pdf" (1.0М)
- "Wayner P. Disappearing cryptography.. Information hiding.. Steganography & watermarking (3ed., Morgan Kaufmann, 2009)(ISBN 0123744792)(442s)_CsCr_.pdf" (4.2М)
- "Welschenbach M. Cryptography in C and C++ (2ed., Apress, 2005)(ISBN 1590595025)(O)(504s)_CsCr_.pdf" (1.4М)
- "Welsh D. Codes and cryptography (OUP, 1989)(ISBN 0198532873)(600dpi)(T)(268s)_CsCr_.djvu" (1.7М)
- "Wobst R. Cryptology unlocked (Wiley, 2007)(ISBN 0470060646)(557s)_CsCr_.pdf" (1.9М)
- "Wrixon F.B. Codes, Ciphers, and Secret Languages (Random House, 1989)(ISBN 9780517657041)(T)(259s)_CsCr_.djvu" (2.2М)
- "Yashchenko V. (red.) Vvedenie v kriptografiyu (3izd., MCNMO, 2000)(ISBN 5900916650)(ru)(600dpi)(T)(289s)_CsCr_.djvu" (2.1М)
- "Young A., Yung M. Malicious cryptography.. Exposing cryptovirology (Wiley, 2004)(ISBN 0764549758)(O)(419s)_CsCr_.pdf" (2.6М)
- "Yuen P.K. Practical cryptology and Web security (Pearson Ed., 2006)(ISBN 0321263332)(897s)_CsCr_.pdf" (14.2М)
- "Zenzin O.S., Ivanov M.A. Standart kriptograficheskoj zashchity __AES__. Konechnye polya (KUDIC-Obraz, 2002)(ISBN 5933780464)(600dpi)(ru)(T)(S)(175s)_CsCr_.djvu" (2.2М)
- "Zhukov A.E. Sistemy blochnogo shifrovaniya (MGTU, 2006)(ru)(47s)_CsCr_.pdf" (1.0М)
- "Zhukov A.E. Sistemy potochnogo shifrovaniya (MGTU, 2006)(ru)(49s)_CsCr_.pdf" (939.6К)
- "Zima V., Moldovyan A., Moldovyan N. Bezopasnost' global'nyx setevyx texnologij (BXV, 2000)(ISBN 5941570236)(ru)(T)(S)(320s)_CsCr_.djvu" (3.0М)
- "Zolotaryov V.V., Ovechkin G.V. Pomehoustojchivoe kodirovanie. Metody i algoritmy. Spravochnik (Goryachaya Liniya - Telekom, 2004)(ISBN 5935171694)(ru)(600dpi)(T)(128s)_CsCr_.djvu" (2.6М)
- "Zubov A.Yu. Matematika kodov autentifikacii (Gelios, 2007)(ISBN 9785854381604)(ru)(600dpi)(K)(T)(482s)_CsCr_.djvu" (4.2М)
- "Zubov A.Yu. Sovershennye shifry (Gelios ARV, 2003)(ISBN 5854380765)(ru)(T)(S)(162s)_CsCr_.djvu" (786.1К)
- "van Tilborg H.C.A. Encyclopedia of cryptography and security (Springer, 2005)(ISBN 038723473X)(O)(697s)_CsCr_.pdf" (6.9М)
- "van Tilborg X.K.A. (_van Tilborg H.C.A._) Osnovy kriptologii (Mir, 2006)(ISBN 5030036393)(ru)(400dpi)(T)(S)(474s)_CsCr_.djvu" (5.6М)