Note: if link does not work in internet explorer, use mozila firefox browser .. You can get it from right top corner of this site so first download and install cause links are tested only on mozila firefox.
Copy and paste the links in address bar and change 'hxxp' to 'http' and press enter:
Chapter 1 - Overview of Cryptography (48 pages)
Chapter 2 - Mathematics Background (38 pages)
Chapter 3 - Number-Theoretic Reference Problems (46 pages)
Chapter 4 - Public-Key Parameters (36 pages)
Chapter 5 - Pseudorandom Bits and Sequences (22 pages)
Chapter 6 - Stream Ciphers (32 pages)
Chapter 7 - Block Ciphers (60 pages)
Chapter 8 - Public-Key Encryption (36 pages)
Chapter 9 - Hash Functions and Data Integrity (61 pages)
Chapter 10 - Identification and Entity Authentication (40 pages)
Chapter 11 - Digital Signatures (64 pages)
Chapter 12 - Key Establishment Protocols (53 pages)
Chapter 13 - Key Management Techniques (48 pages)
Chapter 14 - Efficient Implementation (44 pages)
Chapter 15 - Patents and Standards (27 pages)
Appendix - Bibliography of Papers from Selected Cryptographic Forums (40 pages)
Index (26 pages)
GB_Lecture Notes on Cryptography.ps 28-Aug-2003 00:00 2.6M
Menezes_Handbook of Applied Cryptography.zip 28-Aug-2003 00:00 5.3M
cryptography-theory-and-practice.tgz 28-Aug-2003 00:00 14M
cryptography.tgz 28-Aug-2003 00:00 3.1M
cryptologia-history.tgz 28-Aug-2003 00:00 12M
the-twofish-encryption-algorithm.tgz 28-Aug-2003 00:00 589K
hxxp://202.38.126.65/mathdoc/Algebra/Cryptography/
Addison.Wesley.File.System.Forensic.Analysis.Mar.2005.eBook-DDU.chm 15-Jul-2005 17:43 3.8M
Cyber.Forensics.eBook-EEn.pdf 31-May-2005 18:34 3.7M
OReilly.Internet.Forensics.Oct.2005.chm 08-Nov-2005 18:57 844K
Addison[1].Wesley.The.Art.of.Computer.Virus.Research.and.Defense.Feb.2005.eBook-LiB.zip 15-Jul-2005 17:53 13M
GiantBlackBookVirus.rar 31-May-2005 19:48 5.0M
Addison Wesley - Web Hacking Attacks and Defense.chm 30-May-2005 22:51 6.3M
McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf 31-May-2005 15:10 3.4M
McGraw.Hill.Hacking.Exposed.Web.Applications.iNT.eBook-DDU.pdf 31-May-2005 15:32 7.6M
McGraw.Hill.Web.Services.Security.eBook-LiB.chm 30-May-2005 22:58 3.9M
OReilly - Web Security, Privacy & Commerce, 2nd Edition.chm 31-May-2005 15:18 6.1M
OReilly.Essential.PHP.Security.Oct.2005.chm 08-Nov-2005 18:57 369K
Oracle Press - 0072231300 - Effective Oracle Database 10g Security by Design - fly.chm 18-Aug-2005 23:24 3.0M
Oreilly.Apache.Security.Mar.2005.eBook-LiB.chm 30-May-2005 23:02 1.6M
A.LIST.Publishing.Hacker.Disassembling.Uncovered.eBook-LiB.chm 31-May-2005 18:27 4.7M
Crackproof Your Software (2002).pdf 31-May-2005 17:26 7.2M
No.Starch.Press.The.Art.Of.Assembly.Language.eBook-LiB.chm 31-May-2005 18:27 18M
Springer.Reverse.Engineering.of.Object.Oriented.Code.Monographs.in.Computer.Science.eBook-kB.pdf 10-Aug-2005 14:27 6.5M
The Art of Disassembly.rar 31-May-2005 17:34 2.5M
Wiley.Reversing.Secrets.of.Reverse.Engineering.Apr.2005.eBook-DDU.pdf 31-May-2005 18:09 8.4M
Copy and paste the links in address bar and change 'hxxp' to 'http' and press enter:
hxxp://www.inf.ufsc.br/~saddan/Cryptography and Network Security Principles and Practices, Fourth Edition.chm
Handbook of Applied CryptographyChapter 1 - Overview of Cryptography (48 pages)
Chapter 2 - Mathematics Background (38 pages)
Chapter 3 - Number-Theoretic Reference Problems (46 pages)
Chapter 4 - Public-Key Parameters (36 pages)
Chapter 5 - Pseudorandom Bits and Sequences (22 pages)
Chapter 6 - Stream Ciphers (32 pages)
Chapter 7 - Block Ciphers (60 pages)
Chapter 8 - Public-Key Encryption (36 pages)
Chapter 9 - Hash Functions and Data Integrity (61 pages)
Chapter 10 - Identification and Entity Authentication (40 pages)
Chapter 11 - Digital Signatures (64 pages)
Chapter 12 - Key Establishment Protocols (53 pages)
Chapter 13 - Key Management Techniques (48 pages)
Chapter 14 - Efficient Implementation (44 pages)
Chapter 15 - Patents and Standards (27 pages)
Appendix - Bibliography of Papers from Selected Cryptographic Forums (40 pages)
Index (26 pages)
hxxp://www.wntrmute.com/docs/cryptography/
Encryption-Tutorial.tgz 28-Aug-2003 00:00 2.3MGB_Lecture Notes on Cryptography.ps 28-Aug-2003 00:00 2.6M
Menezes_Handbook of Applied Cryptography.zip 28-Aug-2003 00:00 5.3M
cryptography-theory-and-practice.tgz 28-Aug-2003 00:00 14M
cryptography.tgz 28-Aug-2003 00:00 3.1M
cryptologia-history.tgz 28-Aug-2003 00:00 12M
the-twofish-encryption-algorithm.tgz 28-Aug-2003 00:00 589K
hxxp://202.38.126.65/mathdoc/Algebra/Cryptography/
Addison.Wesley.File.System.Forensic.Analysis.Mar.2005.eBook-DDU.chm 15-Jul-2005 17:43 3.8M
Cyber.Forensics.eBook-EEn.pdf 31-May-2005 18:34 3.7M
OReilly.Internet.Forensics.Oct.2005.chm 08-Nov-2005 18:57 844K
Addison[1].Wesley.The.Art.of.Computer.Virus.Research.and.Defense.Feb.2005.eBook-LiB.zip 15-Jul-2005 17:53 13M
GiantBlackBookVirus.rar 31-May-2005 19:48 5.0M
Addison Wesley - Web Hacking Attacks and Defense.chm 30-May-2005 22:51 6.3M
McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf 31-May-2005 15:10 3.4M
McGraw.Hill.Hacking.Exposed.Web.Applications.iNT.eBook-DDU.pdf 31-May-2005 15:32 7.6M
McGraw.Hill.Web.Services.Security.eBook-LiB.chm 30-May-2005 22:58 3.9M
OReilly - Web Security, Privacy & Commerce, 2nd Edition.chm 31-May-2005 15:18 6.1M
OReilly.Essential.PHP.Security.Oct.2005.chm 08-Nov-2005 18:57 369K
Oracle Press - 0072231300 - Effective Oracle Database 10g Security by Design - fly.chm 18-Aug-2005 23:24 3.0M
Oreilly.Apache.Security.Mar.2005.eBook-LiB.chm 30-May-2005 23:02 1.6M
A.LIST.Publishing.Hacker.Disassembling.Uncovered.eBook-LiB.chm 31-May-2005 18:27 4.7M
Crackproof Your Software (2002).pdf 31-May-2005 17:26 7.2M
No.Starch.Press.The.Art.Of.Assembly.Language.eBook-LiB.chm 31-May-2005 18:27 18M
Springer.Reverse.Engineering.of.Object.Oriented.Code.Monographs.in.Computer.Science.eBook-kB.pdf 10-Aug-2005 14:27 6.5M
The Art of Disassembly.rar 31-May-2005 17:34 2.5M
Wiley.Reversing.Secrets.of.Reverse.Engineering.Apr.2005.eBook-DDU.pdf 31-May-2005 18:09 8.4M
hxxp://www.team509.com/download/docs/security/crypt/