- DocumentThe number field sieve for integers of low weight - Oliver Schirokaueruploaded byFrancisco Badaró
- DocumentThe Twofish Team's Final Comments on AES Selection - Bruche Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson, Tadayoshi Kohno, Mike Stayuploaded byFrancisco Badaró
- DocumentRSA Key Extraction via Low-bandwidth Acoustic Cryptanalysis - Daniel Genkin, Adi Shamir, Eran Tromeruploaded byFrancisco Badaró
- DocumentPassword Interception in a SSL_TLS Channel - Brice Canvel, Alain Hiltgen, Serge Vaudenay, Martin Vuagnouxuploaded byFrancisco Badaró
- DocumentAnalysis of SHA-512_224 and SHA-512_256 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Graz University of Technology, Austriauploaded byFrancisco Badaró
- DocumentAttack on Sun's MIDP reference implementation of SSL - Kent Inge Simonsen, Vebjørn Moen, Kjell Jørgen Holeuploaded byFrancisco Badaró
- DocumentAre Your Passwords Safe_energy-efficient Bcrypt Cracking With Low-cost Parallel Hardware - Katja Malvoni, Solar Designer, Josip Knezovicuploaded byFrancisco Badaró
- DocumentA riddle wrapped in an Enigma - Neal Koblitz, Alfred J. Menezesuploaded byFrancisco Badaró
- DocumentTaking Advantage of MikroTik RouterOS Inbuilt Firewall - Martin Pínauploaded byFrancisco Badaró
- DocumentSecuring Your MikroTik Network - Andrew Thriftuploaded byFrancisco Badaró
- DocumentLoad Balancing Using PCC & RouterOS - Steve Discheruploaded byFrancisco Badaró
- DocumentSecuring Networks With MikroTik RouterOS - Tom Smythuploaded byFrancisco Badaró
- DocumentHigh Availability on MikroTik RouterOS - Guilherme Ramiresuploaded byFrancisco Badaró
- DocumentVLAN in MikroTik - Muhammed Khomeini Bin Abuuploaded byFrancisco Badaró
- DocumentMicrosoft Security Intelligence Report Volume 16 - Microsoft Corporationuploaded byFrancisco Badaró
- DocumentLinux Performance Tools (LinuxCon NA) - Brendan Gregguploaded byFrancisco Badaró
- DocumentMemory Deduplication as a Threat to the Guest OS - Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi & Cyrille Artho @ EuroSec2011uploaded byFrancisco Badaró
- DocumentMaking Master_slave Systems Work Better With Pgpool-II - Tatsuo Ishii, SRAA OSS, Inc. Japanuploaded byFrancisco Badaró
- DocumentLinux Performance Tools (LinuxCon EU) - Brendan Gregguploaded byFrancisco Badaró
- DocumentASIC Design SHA256 Implementationuploaded byFrancisco Badaró
- DocumentArt of Anti Detection - 1_Introduction to AV & Detection Techniques - Ege Balci (Invictus Europe)uploaded byFrancisco Badaró