×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Bitmessage: A Peer‐to‐Peer Message Authentication and Delivery System (2012) - Warren.pdf.gz
Home
/
Discover
/
www.kgay4all.com
/
Books
/
library--
/
incoming
/
Parent Folder
Bitmessage: A Peer‐to‐Peer Message Authentication and Delivery System (2012) - Warren.pdf.gz
GZ
2 years ago
Get Size
Copy Link
A Forward-Secure Public-Key Encryption Scheme (2003) - Canetti, Halevi, Katz.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Cache Timing Attacks on Camellia Block Cipher - Zhao, Wang, Zheng.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Chilling Effects: NSA Surveillance Drives U.S. Writers to Self-Censor (2013).pdf.gz
GZ
2 years ago
Get Size
Copy Link
Converged Analysis of Smartphone Devices Identification Processing Tasking: All in a day’s work (2010) - Paula Kuruc, NSA.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Elliptic Curve Cryptography in Practice (2013) - Bos, Halderman, Heninger, Moore, Naehrig, Wustrow.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Financial Cryptography and Data Security (2012).pdf.gz
GZ
2 years ago
Get Size
Copy Link
Handbook of Applied Cryptography.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Hidden Service Naming and TLS Cert Checking with Namecoin: A Tor GSoC Proposal (2014) - Rand.pdf.gz
GZ
2 years ago
Get Size
Copy Link
How Unique and Traceable are Usernames? (2011) - Perito, Castelluccia, Kaafar, Manils.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Key-Privacy in Public-Key Encryption (2001) - Bellare, Boldyreval, Desai, Pointcheval.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Lecture Notes on Cryptography - Micali, Goldwasser.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Microglia Are Essential to Masculinization of Brain and Behavior (2013) - Lenz, Nugent, Haliyur, McCarthy.pdf.gz
GZ
2 years ago
4.66 MB
Copy Link
Optimising Node Selection Probabilities in Multi-Hop MD1 Queuing Networks to Reduce Latency of Tor (2014) - Herbert, Murdoch, Punskaya.pdf.gz
GZ
2 years ago
Get Size
Copy Link
PEN American (2013) - Chilling Effects.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Pinocchio: Nearly Practical Verifiable Computation (2012) - Parno, Gentry.pdf.gz
GZ
2 years ago
Get Size
Copy Link
QUIC Crypto (2013) - Langley, Chang.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Randomizable Proofs and Delegatable Anonymous Credentials (2012) - Camenisch, Lysyanskaya.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
Rootkit in Your Laptop: Hidden code in your chipset and how to discover what exactly it does (2012) - Skochinsky.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Secret Trans-Pacific Partnership Treaty: Intellectual Propert Chapter Draft (2013-11-15) - Wikileaks.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.