A Cryptograpgic Compendium |
A Cryptography Tutorial [summary] (1,2,3,4,5,6,7,8) |
A Specification of Rijndael, the AES Algorithm |
A Twofish retreat: Related-Key attacks against Reduced-Round Twofish |
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent |
An FPGA Implementation of the Linear Cruptanalysis |
Another Cryptography tutorial (1,2,3,4,5,6,7)] |
Architectural considerations for cryptanalytic hardware |
Are 'Strong' Primed Needed for RSA? |
Are 'Strong' Primes Needed for RSA? |
Attacks on Cryptoprocessor Transaction Sets |
Block Ciphers |
Blowfish algorithm in plain English |
C.R.I.S.I.S. - Cryptography's Role In Securing the Information Society |
Compliance Defects in Public-Key Cryptography |
Cryptanalytic Attacks on Pseudorandom Number Generators |
CryptoBytes, RSA newsletter (1-1,1-2,1-3,2-1,2-2,2-3,3-1,3-2,4-1,4-2) |
Cryptography - The myths |
Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML |
Digital Signatures, Certificates and Electronic Commerce |
Efficient Implementation of the Rijndael S-box |
Elliptic Curce Cryptosystems |
Elliptic Curve Cryptography, Future Resiliency and High Security Systems |
Empirical verification of Twofish key uniqueness properties |
Frequently Asked Questions about Today's Cryptography by RSA Laboratories |
Further observations on the Key Schedule of Twofish |
Handbook of Applied Cryptography |
Has the RSA algorithm been compromised as a result of Bernstein's Papar? |
High-Speed RSA implementation |
Implementation Experience with AES Candidate Algorithms |
Implementation of the Twofish Cipher using FPGA devices |
Impossible differentials in Twofish |
Improved Twofish implementations |
Initial Cryptanalysis of the RSA SecurID Algorithm |
Key recovery - Meeting the Needs of Users or Key Escrow in Disguise |
Key separation in Twofish |
On The Security of the RC5 Encryption Algorithm |
Performance Analysis of AES candidates on the 6805 CPU core |
Preliminary Cryptanalysis of Reduced-Round Serpent |
RC6 as the AES |
Recommendation on Elliptic Curve Cryptosystems |
RSA hardware implementation |
RSA Laboratories' Bulletin (1,2,3,4,5,6,7,8,9,10,11,12,13) |
RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4 |
RSAES-OAEP Encryption scheme |
Security Pitfalls in Cryptography |
Security protocols overview by RSA Laboratories |
Smartcard security |
Source code for Blowfish implementation (C++,Another C++,Java,ANSI C,Another ANSI C,Forth,Pascal) |
Source code for Twofish implementation [zip(6805(Smartcard),Z80,Reference C code,ANSI C and i386 asm,Optimised ANSI C,Optimised C code [Linux code],Visual Basic,Java)] |
Statistical testing of RC6 block cipher |
Stream ciphers |
Stream Ciphers |
The block cipher Square |
The DES algorithm |
The Elliptic Curve Cryptosystem |
The Elliptic Curve Cryptosystem for Smart Cards |
The Elliptic Curve Digital Signature Algorithm (ECDSA) |
The ESP RC5-CBC Transform |
The math behind the RSA cipher |
The RC5 encryption algorithm |
The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms |
The RC6 block cipher |
The Rijndael Block Cipher |
The security of RC6 block cipher |
The simple ideal cipher system |
Timing Analysis of Keystrokes and Timing Attacks on SSH |
Trust Models and Management in Public-Key Infrastuctured |
Twofish: A 128-bit Block Cipher |
UK Government Organisations Involved in Communications and Information Systems Security |
Understanding Public Key Infrastructure |
Universal Hashing and Multiple Authentication |
Upper bounds on differential characteristics in Twofish |
WEP Fix using RC4 Fast Packet Keying |
Why Cryptography is Harder than it looks |
Why Textbook ElGamal and RSA Encryption are Insecure |
No comments:
Post a Comment