Datasets:
Tasks:
Text Generation
Languages:
English
Upload folder using huggingface_hub
Browse files- .gitattributes +26 -0
- Cryptography/(eBook) Bruce Schneier - Applied Cryptography, Second Edition - John Wiley & Sons [ISBN0471128457].pdf +3 -0
- Cryptography/A Course In Number Theory And Cryptography 2d ed - Neal Koblitz.djvu +3 -0
- Cryptography/Algebraic Aspects of Cryptography - Neal Koblitz.djvu +3 -0
- Cryptography/Beginning Cryptography with Java - David Hook.chm +3 -0
- Cryptography/Complexity and Cryptography An Introduction - JOHN TALBOT.pdf +3 -0
- Cryptography/Contemporary Cryptography - Rolf Oppliger.pdf +3 -0
- Cryptography/Cryptography For Dummies - Chey Cobb.chm +3 -0
- Cryptography/Cryptography Theory And Practice - Douglas Stinson.pdf +3 -0
- Cryptography/Cryptography and Network Security Principles and Practices, 4th Ed - William Stallings.pdf +3 -0
- Cryptography/Cryptography for Developers - Simon Johnson.pdf +3 -0
- Cryptography/Cryptography in C and C++ - Michael Welschenbach.chm +3 -0
- Cryptography/Encryption in a Windows Environment EFS File, 802.1x Wireless, IPSec Transport, and SMIME Exchange - Rand Morimoto.chm +3 -0
- Cryptography/Foundations of Cryptography A Primer - Oded Goldreich.pdf +3 -0
- Cryptography/Guide to Elliptic Curve Cryptography - Darrel Hankerson.pdf +3 -0
- Cryptography/Handbook of Applied Cryptography (Crc Press Series on Discrete Mathematics and Its Applications) 5th Edition.pdf +3 -0
- Cryptography/Handbook of Applied Cryptography - Alfred J. Menezes.pdf +3 -0
- Cryptography/INTRODUCTION TO CRYPTOGRAPHY WITH JAVA APPLETS - DAVID BISHOP.pdf +3 -0
- Cryptography/Image and Video Encryption From Digital Rights Management to Secured Personal Communication - Sushil Jajodia.pdf +3 -0
- Cryptography/Java Cryptography - Jonathan B. Knudsen.pdf +3 -0
- Cryptography/Learn Encryption Techniques with BASIC and C++ - Gil Held.chm +3 -0
- Cryptography/Malicious Cryptography Exposing Cryptovirology - Adam Young.pdf +3 -0
- Cryptography/Military Cryptanalysis.pdf +3 -0
- Cryptography/Modern Cryptography Theory and Practice - Wenbo Mao.chm +3 -0
- Cryptography/Modern Cryptography Theory and Practice - Wenbo Mao.pdf +3 -0
- Cryptography/PROGRESS ON CRYPTOGRAPHY 25 Years of Cryptography in China - Kefei Chen.pdf +3 -0
- Cryptography/The CodeBreakers - Kahn David.pdf +3 -0
.gitattributes
CHANGED
@@ -265,3 +265,29 @@ Computer[[:space:]]History/Edstrom[[:space:]]&[[:space:]]Eller[[:space:]]-[[:spa
|
|
265 |
Computer[[:space:]]History/Racing_the_Beam_-_The_Atari_Video_Computer_System.pdf filter=lfs diff=lfs merge=lfs -text
|
266 |
Computer[[:space:]]History/Steve[[:space:]]Wozniak[[:space:]]-[[:space:]]iWoz[[:space:]](epub).epub filter=lfs diff=lfs merge=lfs -text
|
267 |
Computer[[:space:]]History/Walter[[:space:]]Isaacson[[:space:]]-[[:space:]]Steve[[:space:]]Jobs[[:space:]](v5.0).epub filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
265 |
Computer[[:space:]]History/Racing_the_Beam_-_The_Atari_Video_Computer_System.pdf filter=lfs diff=lfs merge=lfs -text
|
266 |
Computer[[:space:]]History/Steve[[:space:]]Wozniak[[:space:]]-[[:space:]]iWoz[[:space:]](epub).epub filter=lfs diff=lfs merge=lfs -text
|
267 |
Computer[[:space:]]History/Walter[[:space:]]Isaacson[[:space:]]-[[:space:]]Steve[[:space:]]Jobs[[:space:]](v5.0).epub filter=lfs diff=lfs merge=lfs -text
|
268 |
+
Cryptography/(eBook)[[:space:]]Bruce[[:space:]]Schneier[[:space:]]-[[:space:]]Applied[[:space:]]Cryptography,[[:space:]]Second[[:space:]]Edition[[:space:]]-[[:space:]]John[[:space:]]Wiley[[:space:]]&[[:space:]]Sons[[:space:]]\[ISBN0471128457\].pdf filter=lfs diff=lfs merge=lfs -text
|
269 |
+
Cryptography/A[[:space:]]Course[[:space:]]In[[:space:]]Number[[:space:]]Theory[[:space:]]And[[:space:]]Cryptography[[:space:]]2d[[:space:]]ed[[:space:]]-[[:space:]]Neal[[:space:]]Koblitz.djvu filter=lfs diff=lfs merge=lfs -text
|
270 |
+
Cryptography/Algebraic[[:space:]]Aspects[[:space:]]of[[:space:]]Cryptography[[:space:]][[:space:]]-[[:space:]]Neal[[:space:]]Koblitz.djvu filter=lfs diff=lfs merge=lfs -text
|
271 |
+
Cryptography/Beginning[[:space:]]Cryptography[[:space:]]with[[:space:]]Java[[:space:]]-[[:space:]]David[[:space:]]Hook.chm filter=lfs diff=lfs merge=lfs -text
|
272 |
+
Cryptography/Complexity[[:space:]]and[[:space:]]Cryptography[[:space:]]An[[:space:]]Introduction[[:space:]]-[[:space:]]JOHN[[:space:]]TALBOT.pdf filter=lfs diff=lfs merge=lfs -text
|
273 |
+
Cryptography/Contemporary[[:space:]]Cryptography[[:space:]]-[[:space:]]Rolf[[:space:]]Oppliger.pdf filter=lfs diff=lfs merge=lfs -text
|
274 |
+
Cryptography/Cryptography[[:space:]]and[[:space:]]Network[[:space:]]Security[[:space:]]Principles[[:space:]]and[[:space:]]Practices,[[:space:]]4th[[:space:]]Ed[[:space:]]-[[:space:]]William[[:space:]]Stallings.pdf filter=lfs diff=lfs merge=lfs -text
|
275 |
+
Cryptography/Cryptography[[:space:]]for[[:space:]]Developers[[:space:]]-[[:space:]]Simon[[:space:]]Johnson.pdf filter=lfs diff=lfs merge=lfs -text
|
276 |
+
Cryptography/Cryptography[[:space:]]For[[:space:]]Dummies[[:space:]]-[[:space:]]Chey[[:space:]]Cobb.chm filter=lfs diff=lfs merge=lfs -text
|
277 |
+
Cryptography/Cryptography[[:space:]]in[[:space:]]C[[:space:]]and[[:space:]]C++[[:space:]]-[[:space:]]Michael[[:space:]]Welschenbach.chm filter=lfs diff=lfs merge=lfs -text
|
278 |
+
Cryptography/Cryptography[[:space:]]Theory[[:space:]]And[[:space:]]Practice[[:space:]]-[[:space:]]Douglas[[:space:]]Stinson.pdf filter=lfs diff=lfs merge=lfs -text
|
279 |
+
Cryptography/Encryption[[:space:]]in[[:space:]]a[[:space:]]Windows[[:space:]]Environment[[:space:]]EFS[[:space:]]File,[[:space:]]802.1x[[:space:]]Wireless,[[:space:]]IPSec[[:space:]]Transport,[[:space:]]and[[:space:]]SMIME[[:space:]]Exchange[[:space:]]-[[:space:]]Rand[[:space:]]Morimoto.chm filter=lfs diff=lfs merge=lfs -text
|
280 |
+
Cryptography/Foundations[[:space:]]of[[:space:]]Cryptography[[:space:]]A[[:space:]]Primer[[:space:]]-[[:space:]]Oded[[:space:]]Goldreich.pdf filter=lfs diff=lfs merge=lfs -text
|
281 |
+
Cryptography/Guide[[:space:]]to[[:space:]]Elliptic[[:space:]]Curve[[:space:]]Cryptography[[:space:]]-[[:space:]]Darrel[[:space:]]Hankerson.pdf filter=lfs diff=lfs merge=lfs -text
|
282 |
+
Cryptography/Handbook[[:space:]]of[[:space:]]Applied[[:space:]]Cryptography[[:space:]](Crc[[:space:]]Press[[:space:]]Series[[:space:]]on[[:space:]]Discrete[[:space:]]Mathematics[[:space:]]and[[:space:]]Its[[:space:]]Applications)[[:space:]]5th[[:space:]]Edition.pdf filter=lfs diff=lfs merge=lfs -text
|
283 |
+
Cryptography/Handbook[[:space:]]of[[:space:]]Applied[[:space:]]Cryptography[[:space:]]-[[:space:]]Alfred[[:space:]]J.[[:space:]]Menezes.pdf filter=lfs diff=lfs merge=lfs -text
|
284 |
+
Cryptography/Image[[:space:]]and[[:space:]]Video[[:space:]]Encryption[[:space:]]From[[:space:]]Digital[[:space:]]Rights[[:space:]]Management[[:space:]]to[[:space:]]Secured[[:space:]]Personal[[:space:]]Communication[[:space:]]-[[:space:]]Sushil[[:space:]]Jajodia.pdf filter=lfs diff=lfs merge=lfs -text
|
285 |
+
Cryptography/INTRODUCTION[[:space:]]TO[[:space:]]CRYPTOGRAPHY[[:space:]]WITH[[:space:]]JAVA[[:space:]]APPLETS[[:space:]]-[[:space:]]DAVID[[:space:]]BISHOP.pdf filter=lfs diff=lfs merge=lfs -text
|
286 |
+
Cryptography/Java[[:space:]]Cryptography[[:space:]]-[[:space:]]Jonathan[[:space:]]B.[[:space:]]Knudsen.pdf filter=lfs diff=lfs merge=lfs -text
|
287 |
+
Cryptography/Learn[[:space:]]Encryption[[:space:]]Techniques[[:space:]]with[[:space:]]BASIC[[:space:]]and[[:space:]]C++[[:space:]]-[[:space:]]Gil[[:space:]]Held.chm filter=lfs diff=lfs merge=lfs -text
|
288 |
+
Cryptography/Malicious[[:space:]]Cryptography[[:space:]]Exposing[[:space:]]Cryptovirology[[:space:]]-[[:space:]]Adam[[:space:]]Young.pdf filter=lfs diff=lfs merge=lfs -text
|
289 |
+
Cryptography/Military[[:space:]]Cryptanalysis.pdf filter=lfs diff=lfs merge=lfs -text
|
290 |
+
Cryptography/Modern[[:space:]]Cryptography[[:space:]]Theory[[:space:]]and[[:space:]]Practice[[:space:]]-[[:space:]]Wenbo[[:space:]]Mao.chm filter=lfs diff=lfs merge=lfs -text
|
291 |
+
Cryptography/Modern[[:space:]]Cryptography[[:space:]]Theory[[:space:]]and[[:space:]]Practice[[:space:]]-[[:space:]]Wenbo[[:space:]]Mao.pdf filter=lfs diff=lfs merge=lfs -text
|
292 |
+
Cryptography/PROGRESS[[:space:]]ON[[:space:]]CRYPTOGRAPHY[[:space:]]25[[:space:]]Years[[:space:]]of[[:space:]]Cryptography[[:space:]]in[[:space:]]China[[:space:]]-[[:space:]]Kefei[[:space:]]Chen.pdf filter=lfs diff=lfs merge=lfs -text
|
293 |
+
Cryptography/The[[:space:]]CodeBreakers[[:space:]]-[[:space:]]Kahn[[:space:]]David.pdf filter=lfs diff=lfs merge=lfs -text
|
Cryptography/(eBook) Bruce Schneier - Applied Cryptography, Second Edition - John Wiley & Sons [ISBN0471128457].pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:67faa5fbcea09329e6ac02220dc42ec2123f45682c47fb77ed2e88d0d9306edc
|
3 |
+
size 8734407
|
Cryptography/A Course In Number Theory And Cryptography 2d ed - Neal Koblitz.djvu
ADDED
Git LFS Details
|
Cryptography/Algebraic Aspects of Cryptography - Neal Koblitz.djvu
ADDED
Git LFS Details
|
Cryptography/Beginning Cryptography with Java - David Hook.chm
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:666fe378bdb364e06ad2625584f4cd64d53860728af473ddadf19e6d2fe326ea
|
3 |
+
size 2568643
|
Cryptography/Complexity and Cryptography An Introduction - JOHN TALBOT.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:0b158e1f56947606fc20874d04c4d26c4568538444b763484ac01bcbf7e39c39
|
3 |
+
size 3432898
|
Cryptography/Contemporary Cryptography - Rolf Oppliger.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:162005dbc5a04dd4377d2d5a3671b9a1da9198b028043b04418ee1e261ce80f9
|
3 |
+
size 8048306
|
Cryptography/Cryptography For Dummies - Chey Cobb.chm
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:46600562a858f7c571e310531850517ec3a225d8b1bc60f95dc51ed8c9c32ec6
|
3 |
+
size 4183321
|
Cryptography/Cryptography Theory And Practice - Douglas Stinson.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:82c92267a724b5892d0bbd10d932075f10e2123bf4525d783072feb8def7c6d8
|
3 |
+
size 17635745
|
Cryptography/Cryptography and Network Security Principles and Practices, 4th Ed - William Stallings.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:77990c98ec1ae89d8ceacbf3b6ab30b2d5cba5c0d508b11c6ae9c1f4e880c5b7
|
3 |
+
size 55490623
|
Cryptography/Cryptography for Developers - Simon Johnson.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:11b60dc57484abbda258028f5fc9eeb827a426203fed255ecdb68b29ac39c7be
|
3 |
+
size 5257120
|
Cryptography/Cryptography in C and C++ - Michael Welschenbach.chm
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d2bdb6d6f202fe70a36bc7ecbe3b01f9d61d57b1ef9898cb01e0ceac44eee469
|
3 |
+
size 3666128
|
Cryptography/Encryption in a Windows Environment EFS File, 802.1x Wireless, IPSec Transport, and SMIME Exchange - Rand Morimoto.chm
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:e92f94aa9121217ea6b31febc561f0145b187f7525f71d059dc401c6845e6f6c
|
3 |
+
size 1866715
|
Cryptography/Foundations of Cryptography A Primer - Oded Goldreich.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:176f90059a239d5d109cde79cddabbfc5b535b4624651eff0c430c470404c950
|
3 |
+
size 2202558
|
Cryptography/Guide to Elliptic Curve Cryptography - Darrel Hankerson.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:46b5e48e92d4ef352b22316c74a50a15248d5265d83ffd9ad32b6013c4bca0b8
|
3 |
+
size 4580082
|
Cryptography/Handbook of Applied Cryptography (Crc Press Series on Discrete Mathematics and Its Applications) 5th Edition.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:13acc1da0cb8643c362353507e6500fa501643609a42383ad50e694ac513dfb5
|
3 |
+
size 5763840
|
Cryptography/Handbook of Applied Cryptography - Alfred J. Menezes.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:6d6fd7532e8b2e0b676fb5fcb8ff63b870fee5081c6fceea8047330521cbc85f
|
3 |
+
size 4857327
|
Cryptography/INTRODUCTION TO CRYPTOGRAPHY WITH JAVA APPLETS - DAVID BISHOP.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:67b1e06b0987ba61b47281260521d5b1e3807c91cf9be7304a4dccecb94cceac
|
3 |
+
size 10165157
|
Cryptography/Image and Video Encryption From Digital Rights Management to Secured Personal Communication - Sushil Jajodia.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:f0231a05a14433a11488e6e9df2fa28f1ebc563a88174474ea3ada5c0d122c10
|
3 |
+
size 8057328
|
Cryptography/Java Cryptography - Jonathan B. Knudsen.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:b529fa370d126d9b3512e3c4c41cf5a56d58dc564fec1e1ed487b13d8dd71180
|
3 |
+
size 1546050
|
Cryptography/Learn Encryption Techniques with BASIC and C++ - Gil Held.chm
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:77629faf4335ba2ddc7aff1c0d0092d2dc791bdb141d97d44b795314fdf93f44
|
3 |
+
size 2928445
|
Cryptography/Malicious Cryptography Exposing Cryptovirology - Adam Young.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:adcaf371d652019686dba349f3bb33bba2692b423bebae8e1e20b5ef90fcd6c7
|
3 |
+
size 30489675
|
Cryptography/Military Cryptanalysis.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:a187735f31e2a077d2f172f9216f09db504715b90282786e61d64708af77865d
|
3 |
+
size 49835817
|
Cryptography/Modern Cryptography Theory and Practice - Wenbo Mao.chm
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:26a2b33e1706d15c7559c378829c3ee1666a3f7e58ff6d8ce4af6fbee60f2dac
|
3 |
+
size 3369925
|
Cryptography/Modern Cryptography Theory and Practice - Wenbo Mao.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:e47bb99f61f5328a90e778da482870a4a446ad4247ad7958a15f7658d8bc4fbc
|
3 |
+
size 18699107
|
Cryptography/PROGRESS ON CRYPTOGRAPHY 25 Years of Cryptography in China - Kefei Chen.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:4c261eaab141a3d108f66af6fc4b9f166c8b8804718fbba6f2d335d5898fb0c0
|
3 |
+
size 5237243
|
Cryptography/The CodeBreakers - Kahn David.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:66b1c26f87a22ce7ac428784cbd5dc8196c975ec6e2a71b380c663bc84860a11
|
3 |
+
size 1509257
|