| A Cryptograpgic Compendium |
| A Cryptography Tutorial [summary] (1,2,3,4,5,6,7,8) |
| A Specification of Rijndael, the AES Algorithm |
| A Twofish retreat: Related-Key attacks against Reduced-Round Twofish |
| Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent |
| An FPGA Implementation of the Linear Cruptanalysis |
| Another Cryptography tutorial (1,2,3,4,5,6,7)] |
| Architectural considerations for cryptanalytic hardware |
| Are 'Strong' Primed Needed for RSA? |
| Are 'Strong' Primes Needed for RSA? |
| Attacks on Cryptoprocessor Transaction Sets |
| Block Ciphers |
| Blowfish algorithm in plain English |
| C.R.I.S.I.S. - Cryptography's Role In Securing the Information Society |
| Compliance Defects in Public-Key Cryptography |
| Cryptanalytic Attacks on Pseudorandom Number Generators |
| CryptoBytes, RSA newsletter (1-1,1-2,1-3,2-1,2-2,2-3,3-1,3-2,4-1,4-2) |
| Cryptography - The myths |
| Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML |
| Digital Signatures, Certificates and Electronic Commerce |
| Efficient Implementation of the Rijndael S-box |
| Elliptic Curce Cryptosystems |
| Elliptic Curve Cryptography, Future Resiliency and High Security Systems |
| Empirical verification of Twofish key uniqueness properties |
| Frequently Asked Questions about Today's Cryptography by RSA Laboratories |
| Further observations on the Key Schedule of Twofish |
| Handbook of Applied Cryptography |
| Has the RSA algorithm been compromised as a result of Bernstein's Papar? |
| High-Speed RSA implementation |
| Implementation Experience with AES Candidate Algorithms |
| Implementation of the Twofish Cipher using FPGA devices |
| Impossible differentials in Twofish |
| Improved Twofish implementations |
| Initial Cryptanalysis of the RSA SecurID Algorithm |
| Key recovery - Meeting the Needs of Users or Key Escrow in Disguise |
| Key separation in Twofish |
| On The Security of the RC5 Encryption Algorithm |
| Performance Analysis of AES candidates on the 6805 CPU core |
| Preliminary Cryptanalysis of Reduced-Round Serpent |
| RC6 as the AES |
| Recommendation on Elliptic Curve Cryptosystems |
| RSA hardware implementation |
| RSA Laboratories' Bulletin (1,2,3,4,5,6,7,8,9,10,11,12,13) |
| RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4 |
| RSAES-OAEP Encryption scheme |
| Security Pitfalls in Cryptography |
| Security protocols overview by RSA Laboratories |
| Smartcard security |
| Source code for Blowfish implementation (C++,Another C++,Java,ANSI C,Another ANSI C,Forth,Pascal) |
| Source code for Twofish implementation [zip(6805(Smartcard),Z80,Reference C code,ANSI C and i386 asm,Optimised ANSI C,Optimised C code [Linux code],Visual Basic,Java)] |
| Statistical testing of RC6 block cipher |
| Stream ciphers |
| Stream Ciphers |
| The block cipher Square |
| The DES algorithm |
| The Elliptic Curve Cryptosystem |
| The Elliptic Curve Cryptosystem for Smart Cards |
| The Elliptic Curve Digital Signature Algorithm (ECDSA) |
| The ESP RC5-CBC Transform |
| The math behind the RSA cipher |
| The RC5 encryption algorithm |
| The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms |
| The RC6 block cipher |
| The Rijndael Block Cipher |
| The security of RC6 block cipher |
| The simple ideal cipher system |
| Timing Analysis of Keystrokes and Timing Attacks on SSH |
| Trust Models and Management in Public-Key Infrastuctured |
| Twofish: A 128-bit Block Cipher |
| UK Government Organisations Involved in Communications and Information Systems Security |
| Understanding Public Key Infrastructure |
| Universal Hashing and Multiple Authentication |
| Upper bounds on differential characteristics in Twofish |
| WEP Fix using RC4 Fast Packet Keying |
| Why Cryptography is Harder than it looks |
| Why Textbook ElGamal and RSA Encryption are Insecure |
No comments:
Post a Comment