首页
社区
课程
招聘
求助]请高手介绍下有关密码学的网站
发表于: 2008-7-30 15:59 4955

求助]请高手介绍下有关密码学的网站

2008-7-30 15:59
4955
收藏
免费 0
支持
分享
最新回复 (1)
雪    币: 34
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
2
be3K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4g2F1k6q4)9J5k6h3&6G2k6r3q4C8i4K6u0W2k6h3c8#2i4K6u0r3L8%4u0Y4i4K6u0r3j5%4u0&6M7s2c8G2i4K6u0r3j5%4u0&6M7s2c8G2i4K6u0r3 (American Cryptogram Association)

375K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4W2L8h3W2G2N6r3W2U0M7#2)9J5k6h3y4G2L8g2)9J5c8X3y4J5P5i4m8@1L8#2)9J5c8X3W2F1k6r3g2^5i4K6u0W2K9s2c8E0L8l9`.`. (monoalphabetic cryptography game on pc)

1b0K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4g2F1K9g2)9J5k6r3#2S2L8X3&6Z5k6h3W2E0i4K6u0W2k6r3g2Q4x3V1k6K6N6s2g2V1L8%4u0Y4i4K6u0r3k6#2)9J5k6g2)9J5k6g2)9J5k6i4u0&6M7s2c8G2L8r3!0Y4x3g2)9J5k6h3S2@1L8h3H3`. (A lot of links (approximately 500) on cryptography)

a63K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3u0D9k6i4c8U0K9r3I4W2P5i4m8S2M7X3E0Q4x3X3g2G2M7X3N6Q4x3X3g2#2K9#2)9J5c8W2)9J5y4X3&6T1M7%4m8Q4x3@1u0Q4x3U0k6F1j5Y4y4H3i4K6y4n7i4K6t1^5L8$3k6X3j5$3W2S2L8l9`.`. Site Bletchley Park)

881K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4@1k6h3N6G2j5i4u0U0K9r3W2$3k6g2)9J5k6h3y4G2L8g2)9J5c8R3`.`. (Site specialized on the steganography, with an interesting list of software)

e81K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3S2W2M7X3#2W2N6r3W2U0i4K6u0W2j5$3!0E0i4K6u0r3k6$3c8D9K9h3u0J5j5i4u0&6i4K6u0r3 (Transcription of the manuscript quantified founder of the company “Dawn Golden delicious”.)

de6K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4m8J5L8#2)9J5k6h3N6G2N6W2)9J5k6i4g2C8i4K6u0r3N6X3W2J5N6s2g2S2L8r3#2#2M7$3g2#2L8g2)9J5c8Y4y4H3K9h3g2K6i4K6u0r3k6r3g2X3j5i4g2D9N6q4)9J5k6h3S2@1L8b7`.`. (A presentation of codes and figures)

f38K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4N6A6M7$3c8G2L8g2)9J5k6i4N6W2K9i4A6E0j5h3&6F1i4K6u0W2j5h3y4Q4x3X3g2A6L8q4)9J5c8W2)9%4c8h3q4D9j5X3W2Q4x3V1k6U0M7Y4W2H3N6r3q4F1j5h3I4&6M7$3W2K6i4K6u0r3 (A course online of cryptanalyse)

06fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4K6i4K6u0W2M7X3!0U0K9r3g2K6N6r3g2J5i4K6u0W2k6h3c8#2i4K6u0r3N6g2)9J5c8X3u0J5L8%4N6F1i4K6u0r3b7%4u0&6M7s2c8G2i4K6u0r3b7%4u0&6M7s2c8G2i4K6u0W2K9s2c8E0L8l9`.`. (A course online of cryptanalyse)

a2dK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3g2K6K9$3W2E0L8#2)9J5k6h3y4G2L8g2)9J5c8W2)9%4c8i4N6W2K9h3c8S2K9g2)9J5c8X3y4J5P5i4m8@1L8r3W2T1i4K6u0W2K9s2c8E0L8l9`.`. (Dai Wei, « Crypto++ », Bibilothèque of C++ programs relating to cryptography )

b19K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4g2E0K9h3y4Z5i4K6u0W2k6h3c8#2i4K6u0r3i4K6N6q4N6h3#2A6j5$3S2Q4x3V1k6X3L8g2)9J5k6o6x3@1i4K6u0V1y4o6m8Q4x3X3b7J5i4K6u0r3 (FIELD MANUAL NO 34-40-2. courses of cryptanalyse of the American army)

eeaK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4J5P5i4m8@1L8$3!0D9i4K6u0W2j5$3!0E0i4K6u0r3i4K6t1^5c8Y4u0W2k6i4N6S2M7X3f1`. of  help to decoding. allows also coding with many methods .)

422K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3c8A6M7$3q4H3M7r3g2S2M7X3W2F1k6#2)9J5k6r3W2F1j5#2)9J5k6h3y4G2L8g2)9J5c8R3`.`. (Encyclopedia on line of the cryptographic protocols)

6a0K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6W2j5X3S2G2L8h3g2Q4x3X3g2A6k6r3W2J5k6h3y4@1i4K6u0W2j5$3!0E0i4K6u0r3i4K6N6q4K9Y4m8J5L8$3y4Q4x3V1k6U0M7W2)9J5k6g2)9J5k6g2)9J5k6i4W2H3N6r3!0Q4y4h3k6Z5K9i4y4@1i4K6u0W2K9s2c8E0L8q4)9J5z5p5p5`. summarized history of cryptology)

808K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3k6D9P5g2)9J5k6h3S2A6N6$3q4S2P5g2)9J5k6h3&6W2N6q4)9J5c8W2)9%4c8i4m8S2N6h3I4Q4x3V1k6U0M7Y4W2H3N6r3!0D9L8$3N6&6i4K6u0r3K9r3W2K6N6r3!0J5P5g2)9J5k6h3S2@1L8h3H3`. (A history of cryptology between 1470 and 1606, at the time of Shakespeare.)

7d6K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4k6W2j5%4c8G2M7Y4y4A6N6r3g2Q4x3X3g2F1k6i4c8Q4x3V1k6@1N6r3y4G2k6r3g2Q4x3X3g2Z5N6r3#2D9 (Complete presentation of the cryptology from Antiquity to our days.)

2eaK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3N6F1N6g2)9J5k6h3!0J5k6#2)9J5c8Y4y4G2k6Y4c8%4j5i4u0W2i4K6u0r3j5$3I4S2M7%4y4H3j5i4c8Q4x3X3g2Q4x3X3g2Q4x3X3g2@1L8#2)9J5c8X3y4J5P5i4m8@1L8#2)9J5k6h3S2@1L8h3H3`. (Programs Java of cryptography in freeware.)

d22K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3q4F1N6r3W2D9L8r3g2K6i4K6u0W2K9K6p5J5i4K6u0W2N6X3W2Q4x3X3g2#2M7#2)9J5c8X3#2S2N6r3S2Q4x3V1k6U0M7Y4W2H3N6r3!0@1N6i4c8Q4x3V1k6Z5L8$3#2W2i4K6u0W2K9s2c8E0 (A tutoriel of cryptography on the most known figures of traditional and modern cryptography.)

f39K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4c8J5K9h3&6U0L8$3I4D9i4K6u0W2k6h3c8#2i4K6u0r3k6r3g2H3N6s2y4Q4x3V1k6U0M7s2y4U0i4K6u0r3j5#2)9J5k6g2)9J5k6g2)9J5k6i4m8Z5P5g2)9J5c8X3W2F1k6r3g2^5i4K6u0W2K9s2c8E0L8l9`.`. (With CryptoTool, a software of coding/decoding for Macintoch.)

33bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3A6B7N6r3y4Q4x3X3g2U0L8$3#2Q4x3V1k6e0N6r3g2Y4j5h3&6G2k6%4u0S2M7r3S2&6i4K6u0r3 (The site of an author specialized in the steganography)

129K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3S2G2L8h3g2Q4x3X3g2S2N6s2c8Q4x3X3g2F1k6i4c8Q4x3V1k6Q4y4@1g2@1L8r3g2S2M7Y4W2Q4x3V1k6U0M7Y4W2H3N6r3!0D9L8#2)9J5k6h3S2@1L8b7`.`. (Some algorithms of modern cryptology (RSA, MD5,…)

a47K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3S2G2L8h3g2Q4x3X3g2S2N6s2c8Q4x3X3g2F1k6i4c8Q4x3V1k6Q4y4@1g2@1L8r3g2S2M7Y4W2Q4x3V1k6U0M7Y4W2H3N6r3!0D9L8#2)9J5k6h3S2@1L8b7`.`. (A short overflight of the cryptology of the Elizabéthaine period.)

[url]a4bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4W2L8Y4c8J5j5h3I4Q4x3X3g2W2k6s2g2Q4x3V1k6Z5L8$3#2W2M7r3q4Y4k6i4y4Q4x3V1k6x3K9h3&6@1L8$3&6f1i4K6u0r3
classes/spring01/cryptography/cryptography.htm [url](A course online of cryptology with many programs java and Mathematica.)

244K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2S2N6r3S2Q4x3X3g2#2j5%4y4V1i4K6u0W2k6h3c8#2i4K6u0r3i4K6N6q4j5%4u0&6M7s2c8G2i4K6u0r3 (Useful applet java for the cryptanalyse of the figure of Vigenère and the figures monoalphabetic.)

367K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3k6G2M7Y4c8#2L8X3g2U0K9i4c8&6i4K6u0W2j5$3!0E0i4K6u0r3M7$3E0&6M7$3y4J5j5i4m8W2i4K6u0W2i4K6u0W2i4K6u0W2y4K6W2Q4x3V1k6D9k6i4y4K6L8$3^5I4i4K6u0W2K9s2c8E0 (A course online of cryptology)

c63K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3y4K6M7X3y4Q4x3X3g2F1K9i4y4@1i4K6u0W2k6$3!0$3i4K6u0r3 (Site of the National Institute of Standards and Technology)

ddfK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3&6K6j5g2)9J5k6h3N6G2N6W2)9J5c8X3#2#2M7$3g2#2L8g2)9J5c8X3W2F1k6r3g2^5i4K6u0W2j5$3k6E0 (The museum of the “National Security Agency”)

5c7K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4u0A6k6r3g2^5i4K6u0W2j5$3!0Q4x3X3g2#2K9#2)9J5c8X3y4J5P5i4m8@1L8$3I4G2k6%4W2Q4x3V1j5`. (An history very provided of cryptology)

e92K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2W2L8h3u0W2M7Y4y4Q4x3X3g2S2L8$3I4Q4x3X3g2U0L8$3#2Q4x3V1k6B7M7r3g2K6j5$3S2W2L8q4)9J5c8X3S2A6M7%4c8G2M7X3W2U0j5h3I4Q4x3X3g2Z5N6r3@1`. (Enigma and some tools of cryptanalyse)

667K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4D9i4K6u0W2j5$3q4E0i4K6u0W2j5h3y4Q4x3X3g2#2K9#2)9J5c8W2)9%4c8h3k6S2M7s2l9J5i4K6u0r3M7%4c8W2k6$3q4Q4x3X3g2Q4x3X3g2Q4x3X3g2&6i4K6u0r3K9r3W2K6N6r3!0J5P5g2)9J5k6h3S2@1L8h3H3`. (List old references)

238K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3#2W2L8h3u0W2M7Y4y4Q4x3X3g2S2L8$3&6Q4x3X3g2S2N6q4)9J5c8X3y4A6M7r3S2W2M7X3y4D9k6i4u0C8i4K6u0r3 (A great quantity of applet java of coding)

d3bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2S2N6r3S2Q4x3X3g2@1k6h3#2H3L8r3g2Q4x3X3g2W2k6s2g2Q4x3V1k6Q4y4@1g2J5k6h3&6S2N6h3I4@1i4K6u0r3i4K6u0W2i4K6u0W2i4K6u0W2i4K6u0r3M7%4W2D9L8r3q4T1N6i4y4Q4x3X3g2Z5N6r3#2D9 (Some algorithms illustrated by programs Javascript)

081K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3y4G2k6r3g2T1M7X3g2S2K9$3g2J5i4K6u0W2k6r3W2V1M7#2)9J5k6h3y4G2L8g2)9J5c8X3W2F1k6r3g2^5i4K6u0W2K9s2c8E0 (Stories on the code secret, software  of cryptography. Site companion of the books that the author wrote.)

1f0K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4A6M7r3S2W2M7Y4y4T1P5i4u0A6N6s2c8W2M7W2)9J5k6h3y4G2L8g2)9J5c8R3`.`. (Commercial site proposing many information on cryptography.)

d9cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4G2k6r3g2K6j5h3&6V1j5$3W2H3K9r3g2J5M7#2)9J5k6h3!0J5k6#2)9J5k6i4g2C8i4K6u0r3 (History of the Enigma decoding  in Bletchley Park)

99cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3S2G2L8h3g2Q4x3X3g2W2j5$3&6Q4x3X3g2S2j5W2)9J5k6h3y4S2i4K6u0r3i4K6N6q4K9Y4y4S2N6X3q4J5k6q4)9J5c8X3y4J5P5i4m8@1L8#2)9J5c8X3A6K6j5%4u0&6M7s2c8Q4x3X3g2Z5N6r3@1`. (Very complete presentation of the figures from Antiquity to our days)

d0bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3E0#2L8r3W2U0K9r3E0A6i4K6u0W2j5$3!0E0i4K6y4m8z5o6p5H3x3g2)9J5c8X3y4J5P5i4m8@1L8$3I4G2k6%4W2Q4x3V1j5`. (A small course of cryptology with much of interactive programs)

f91K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4A6L8h3!0F1M7$3W2F1k6$3S2Q4x3X3g2F1k6i4c8Q4x3V1k6f1K9r3g2Q4y4h3k6n7L8r3q4U0K9#2)9#2k6V1y4Z5j5h3#2T1k6i4u0Q4x3V1k6Z5L8$3#2W2i4K6u0W2K9s2c8E0L8l9`.`. (Some figures in Javascript.)

039K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4y4E0K9i4c8Z5M7%4u0A6M7$3y4S2i4K6u0W2k6r3g2E0L8$3&6Q4x3X3g2U0L8#2)9J5k6i4g2C8i4K6u0r3j5%4u0&6M7s2c8G2i4K6u0V1j5h3&6U0K9h3g2F1N6q4)9J5k6h3S2@1L8h3H3`. (History of the figures and the codes.)

db5K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3u0D9N6h3g2S2L8X3N6W2L8q4)9J5k6h3c8W2L8h3!0F1i4K6u0W2j5$3!0Q4x3X3g2#2K9#2)9J5c8X3y4J5P5i4m8@1L8#2)9J5c8R3`.`. (Simulators of various machines of coding.)

43aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3S2W2L8g2)9J5k6i4m8S2M7%4y4S2k6$3g2F1i4K6u0W2M7$3g2Q4x3V1k6@1j5h3^5H3x3g2)9J5c8R3`.`. (cryptography element , machines, files of the 2nd world war, cryptograms.)

2bcK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3g2K6j5i4c8Q4x3X3g2C8N6h3I4W2N6i4k6W2L8W2)9J5k6h3q4U0i4K6u0W2j5X3g2Q4x3V1k6U0L8%4y4A6j5#2)9J5c8X3W2F1N6s2u0G2i4K6u0r3 (Illustrated lexicon in an amusing way)

377K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3k6J5L8$3c8W2i4K6u0W2K9r3!0E0k6g2)9J5k6h3y4W2M7X3&6Q4x3X3g2U0K9q4)9J5c8X3k6J5L8$3c8W2i4K6u0r3j5%4u0&6M7s2c8G2i4K6u0r3K9h3&6V1k6i4S2Q4x3X3g2Z5N6r3#2D9 (Historical articles, links, but especially of the simulators of machines of coding for PC (Enigma, Nema, etc))

7bbK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3#2S2N6r3S2Q4x3X3g2G2K9%4y4@1j5i4c8W2i4K6u0W2k6h3c8#2i4K6u0r3i4K6N6q4N6%4u0A6k6$3S2@1k6q4)9J5c8X3y4J5P5i4m8@1i4K6u0r3L8h3q4H3L8r3g2Q4x3V1j5`. (Programs on cryptology written in Maple)
2008-7-31 09:52
0
游客
登录 | 注册 方可回帖
返回