Cryptography
Posted by Subash | 6:39 PM
[2] Comments
- A Cryptography Tutorial [summary,pdf(1,2,3,4,5,6,7,8)]
- Another Cryptography tutorial [pdf(1,2,3,4,5,6,7)]
- Cryptography - The myths [pdf]
- A Cryptograpgic Compendium [link]
- Frequently Asked Questions about Today's Cryptography by RSA Laboratories [pdf]
- Security protocols overview by RSA Laboratories [pdf]
- Security Pitfalls in Cryptography [pdf]
- Stream ciphers [pdf]
- Understanding Public Key Infrastructure [pdf]
- Trust Models and Management in Public-Key Infrastuctured [pdf]
- Why Cryptography is Harder than it looks [pdf]
- Cryptanalytic Attacks on Pseudorandom Number Generators [pdf]
- CryptoBytes, RSA newsletter [pdf(1-1,1-2,1-3,2-1,2-2,2-3,3-1,3-2,4-1,4-2)]
- RSA Laboratories' Bulletin [pdf(1,2,3,4,5,6,7,8,9,10,11,12,13)]
- Smartcard security [pdf]
- Digital Signatures, Certificates and Electronic Commerce [pdf]
- Key recovery - Meeting the Needs of Users or Key Escrow in Disguise [pdf]
- Implementation Experience with AES Candidate Algorithms [pdf]
- Performance Analysis of AES candidates on the 6805 CPU core [pdf]
- UK Government Organisations Involved in Communications and Information Systems Security [pdf]
- The block cipher Square [pdf]
- Attacks on Cryptoprocessor Transaction Sets [pdf]
- Initial Cryptanalysis of the RSA SecurID Algorithm [pdf]
- Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent [pdf]
- Preliminary Cryptanalysis of Reduced-Round Serpent [pdf]
- Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML [pdf]
- Compliance Defects in Public-Key Cryptography [pdf]
- Architectural considerations for cryptanalytic hardware [pdf]
- WEP Fix using RC4 Fast Packet Keying [pdf]
- RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4 [pdf]
- Block Ciphers [pdf]
- Stream Ciphers [pdf]
- C.R.I.S.I.S. - Cryptography's Role In Securing the Information Society [pdf]
- Universal Hashing and Multiple Authentication [pdf]
- Timing Analysis of Keystrokes and Timing Attacks on SSH [pdf]
- The simple ideal cipher system [pdf]
- An FPGA Implementation of the Linear Cruptanalysis [pdf]
- The math behind the RSA cipher [txt]
- RSA hardware implementation [pdf]
- High-Speed RSA implementation [pdf]
- Are 'Strong' Primes Needed for RSA? [pdf]
- RSAES-OAEP Encryption scheme [pdf]
- Has the RSA algorithm been compromised as a result of Bernstein's Papar? [pdf]
- Are 'Strong' Primed Needed for RSA? [pdf]
- Why Textbook ElGamal and RSA Encryption are Insecure [pdf]
- The DES algorithm [txt]
- The RC5 encryption algorithm [pdf]
- On The Security of the RC5 Encryption Algorithm [pdf]
- The ESP RC5-CBC Transform [txt]
- The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms [txt]
- The RC6 block cipher [pdf]
- RC6 as the AES [pdf]
- The security of RC6 block cipher [pdf]
- Statistical testing of RC6 block cipher [pdf]
- Blowfish algorithm in plain English [txt]
- Source code for Blowfish implementation [zip(C++,Another C++,Java,ANSI C,Another ANSI C,Forth,Pascal)]
- Twofish: A 128-bit Block Cipher [pdf]
- Upper bounds on differential characteristics in Twofish [pdf]
- Impossible differentials in Twofish [pdf]
- A Twofish retreat: Related-Key attacks against Reduced-Round Twofish [pdf]
- Further observations on the Key Schedule of Twofish [pdf]
- Empirical verification of Twofish key uniqueness properties [pdf]
- Key separation in Twofish [pdf]
- Improved Twofish implementations [pdf]
- Implementation of the Twofish Cipher using FPGA devices [pdf]
- Source code for Twofish implementation [zip(6805(Smartcard),Z80,Reference C code,ANSI C and i386 asm,Optimised ANSI C,Optimised C code [Linux code],Visual Basic,Java)]
- The Rijndael Block Cipher [pdf]
- A Specification of Rijndael, the AES Algorithm [pdf]
- Efficient Implementation of the Rijndael S-box [pdf]
- The Elliptic Curve Cryptosystem [pdf]
- Elliptic Curce Cryptosystems [pdf]
- Elliptic Curve Cryptography, Future Resiliency and High Security Systems [pdf]
- The Elliptic Curve Cryptosystem for Smart Cards [pdf]
- The Elliptic Curve Digital Signature Algorithm (ECDSA) [pdf]
- Recommendation on Elliptic Curve Cryptosystems [pdf]
- Elliptic Curve Cryptosystems on Reconfigurable Hardware [pdf]
2:42 AM
update your links please, nothing ssems to be good.
7:58 AM
Bhai add pdf to links....