Wednesday, September 3, 2008

CGI, CSS, Computer Clusters, Cryptography




CGI

CGI

CGI Developer's Guide

CGI Manual of Style

CGI Manual Of Style

CGI Programming on the World Wide Web

CGI Programming Unle

CGI StepByStep

CORBA In 14 Days

Using CGI

   

CSS

Advanced CSS Layouts: Step by Step

Architecting CSS (Garrett Dimon)

Cascading Style Sheets (CSS) Reference

Cascading Style Sheets, Guide and Reference

Cascading Style Sheets, Level 2 CSS2 Specification

Cascading Style Sheets, Level 2 CSS2 Specification

Complete CSS (Cascading Style Sheets) Guide

CSS 1 Tutorial

CSS 2 Tutorial

CSS Cheat Sheet

CSS Mastery: Page Layout

CSS Shorthand Guide (Dustin Diaz)

CSS Trick: Using Fewer Images

CSS Tutorial

CSS2 Reference

Floatutorial: Simple Tutorials on CSS Floats

How to Create CSS Overlapping Tabs?

How to Structure Large CSS Files

Introduction to CSS

NCD Cascading Style Sheet (CSS) Guide

Styled Form Controls

Understanding the CSS Box Model

COBOL

A Beginners Guide to COBOL Programming

COBOL Programming Course

COBOL Programming Course

HP COBOL II/XL Reference Manual

Structured Programming with COBOL Examples

Teach Yourself COBOL in 21 Days

WebSphere Studio COBOL for Windows - Language Reference

zingCOBOL - A Beginners Guide to COBOL Programming

Computer Clusters

High Performance Computing and Beowulf Clusters

Web Search for a Planet: The Google Cluster Architecture

Cryptography

A Cryptograpgic Compendium

A Cryptography Tutorial [summary] (1,2,3,4,5,6,7,8)

A Specification of Rijndael, the AES Algorithm

A Twofish retreat: Related-Key attacks against Reduced-Round Twofish

Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent

An FPGA Implementation of the Linear Cruptanalysis

Another Cryptography tutorial (1,2,3,4,5,6,7)]

Architectural considerations for cryptanalytic hardware

Are 'Strong' Primed Needed for RSA?

Are 'Strong' Primes Needed for RSA?

Attacks on Cryptoprocessor Transaction Sets

Block Ciphers

Blowfish algorithm in plain English

C.R.I.S.I.S. - Cryptography's Role In Securing the Information Society

Compliance Defects in Public-Key Cryptography

Cryptanalytic Attacks on Pseudorandom Number Generators

CryptoBytes, RSA newsletter (1-1,1-2,1-3,2-1,2-2,2-3,3-1,3-2,4-1,4-2)

Cryptography - The myths

Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML

Digital Signatures, Certificates and Electronic Commerce

Efficient Implementation of the Rijndael S-box

Elliptic Curce Cryptosystems

Elliptic Curve Cryptography, Future Resiliency and High Security Systems

Empirical verification of Twofish key uniqueness properties

Frequently Asked Questions about Today's Cryptography by RSA Laboratories

Further observations on the Key Schedule of Twofish

Handbook of Applied Cryptography

Has the RSA algorithm been compromised as a result of Bernstein's Papar?

High-Speed RSA implementation

Implementation Experience with AES Candidate Algorithms

Implementation of the Twofish Cipher using FPGA devices

Impossible differentials in Twofish

Improved Twofish implementations

Initial Cryptanalysis of the RSA SecurID Algorithm

Key recovery - Meeting the Needs of Users or Key Escrow in Disguise

Key separation in Twofish

On The Security of the RC5 Encryption Algorithm

Performance Analysis of AES candidates on the 6805 CPU core

Preliminary Cryptanalysis of Reduced-Round Serpent

RC6 as the AES

Recommendation on Elliptic Curve Cryptosystems

RSA hardware implementation

RSA Laboratories' Bulletin (1,2,3,4,5,6,7,8,9,10,11,12,13)

RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4

RSAES-OAEP Encryption scheme

Security Pitfalls in Cryptography

Security protocols overview by RSA Laboratories

Smartcard security

Source code for Blowfish implementation (C++,Another C++,Java,ANSI C,Another ANSI C,Forth,Pascal)

Source code for Twofish implementation [zip(6805(Smartcard),Z80,Reference C code,ANSI C and i386 asm,Optimised ANSI C,Optimised C code [Linux code],Visual Basic,Java)]

Statistical testing of RC6 block cipher

Stream ciphers

Stream Ciphers

The block cipher Square

The DES algorithm

The Elliptic Curve Cryptosystem

The Elliptic Curve Cryptosystem for Smart Cards

The Elliptic Curve Digital Signature Algorithm (ECDSA)

The ESP RC5-CBC Transform

The math behind the RSA cipher

The RC5 encryption algorithm

The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms

The RC6 block cipher

The Rijndael Block Cipher

The security of RC6 block cipher

The simple ideal cipher system

Timing Analysis of Keystrokes and Timing Attacks on SSH

Trust Models and Management in Public-Key Infrastuctured

Twofish: A 128-bit Block Cipher

UK Government Organisations Involved in Communications and Information Systems Security

Understanding Public Key Infrastructure

Universal Hashing and Multiple Authentication

Upper bounds on differential characteristics in Twofish

WEP Fix using RC4 Fast Packet Keying

Why Cryptography is Harder than it looks

Why Textbook ElGamal and RSA Encryption are Insecure



No comments: