Wednesday, August 8, 2007

Free Books on Cryptograph

  • A Cryptography Tutorial [summary,pdf(1,2,3,4,5,6,7,8)]
  • Another Cryptography tutorial [pdf(1,2,3,4,5,6,7)]
  • Cryptography - The myths [pdf]
  • A Cryptograpgic Compendium [link]
  • Frequently Asked Questions about Today’s Cryptography by RSA Laboratories [pdf]
  • Security protocols overview by RSA Laboratories [pdf]
  • Security Pitfalls in Cryptography [pdf]
  • Stream ciphers [pdf]
  • Understanding Public Key Infrastructure [pdf]
  • Trust Models and Management in Public-Key Infrastuctured [pdf]
  • Why Cryptography is Harder than it looks [pdf]
  • Cryptanalytic Attacks on Pseudorandom Number Generators [pdf]
  • CryptoBytes, RSA newsletter [pdf(1-1,1-2,1-3,2-1,2-2,2-3,3-1,3-2,4-1,4-2)]
  • RSA Laboratories’ Bulletin [pdf(1,2,3,4,5,6,7,8,9,10,11,12,13)]
  • Smartcard security [pdf]
  • Digital Signatures, Certificates and Electronic Commerce [pdf]
  • Key recovery - Meeting the Needs of Users or Key Escrow in Disguise [pdf]
  • Implementation Experience with AES Candidate Algorithms [pdf]
  • Performance Analysis of AES candidates on the 6805 CPU core [pdf]
  • UK Government Organisations Involved in Communications and Information Systems Security [pdf]
  • The block cipher Square [pdf]
  • Attacks on Cryptoprocessor Transaction Sets [pdf]
  • Initial Cryptanalysis of the RSA SecurID Algorithm [pdf]
  • Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent [pdf]
  • Preliminary Cryptanalysis of Reduced-Round Serpent [pdf]
  • Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML [pdf]
  • Compliance Defects in Public-Key Cryptography [pdf]
  • Architectural considerations for cryptanalytic hardware [pdf]
  • WEP Fix using RC4 Fast Packet Keying [pdf]
  • RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4 [pdf]
  • Block Ciphers [pdf]
  • Stream Ciphers [pdf]
  • C.R.I.S.I.S. - Cryptography’s Role In Securing the Information Society [pdf]
  • Universal Hashing and Multiple Authentication [pdf]
  • Timing Analysis of Keystrokes and Timing Attacks on SSH [pdf]
  • The simple ideal cipher system [pdf]
  • An FPGA Implementation of the Linear Cruptanalysis [pdf]
  • The math behind the RSA cipher [txt]
  • RSA hardware implementation [pdf]
  • High-Speed RSA implementation [pdf]
  • Are ’Strong’ Primes Needed for RSA? [pdf]
  • RSAES-OAEP Encryption scheme [pdf]
  • Has the RSA algorithm been compromised as a result of Bernstein’s Papar? [pdf]
  • Are ’Strong’ Primed Needed for RSA? [pdf]
  • Why Textbook ElGamal and RSA Encryption are Insecure [pdf]
  • The DES algorithm [txt]
  • The RC5 encryption algorithm [pdf]
  • On The Security of the RC5 Encryption Algorithm [pdf]
  • The ESP RC5-CBC Transform [txt]
  • The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms [txt]
  • The RC6 block cipher [pdf]
  • RC6 as the AES [pdf]
  • The security of RC6 block cipher [pdf]
  • Statistical testing of RC6 block cipher [pdf]
  • Blowfish algorithm in plain English [txt]
  • Source code for Blowfish implementation [zip(C++,Another C++,Java,ANSI C,Another ANSI C,Forth,Pascal)]
  • Twofish: A 128-bit Block Cipher [pdf]
  • Upper bounds on differential characteristics in Twofish [pdf]
  • Impossible differentials in Twofish [pdf]
  • A Twofish retreat: Related-Key attacks against Reduced-Round Twofish [pdf]
  • Further observations on the Key Schedule of Twofish [pdf]
  • Empirical verification of Twofish key uniqueness properties [pdf]
  • Key separation in Twofish [pdf]
  • Improved Twofish implementations [pdf]
  • Implementation of the Twofish Cipher using FPGA devices [pdf]
  • Source code for Twofish implementation [zip(6805(Smartcard),Z80,Reference C code,ANSI C and i386 asm,Optimised ANSI C,Optimised C code [Linux code],Visual Basic,Java)]
  • The Rijndael Block Cipher [pdf]
  • A Specification of Rijndael, the AES Algorithm [pdf]
  • Efficient Implementation of the Rijndael S-box [pdf]
  • The Elliptic Curve Cryptosystem [pdf]
  • Elliptic Curce Cryptosystems [pdf]
  • Elliptic Curve Cryptography, Future Resiliency and High Security Systems [pdf]
  • The Elliptic Curve Cryptosystem for Smart Cards [pdf]
  • The Elliptic Curve Digital Signature Algorithm (ECDSA) [pdf]
  • Recommendation on Elliptic Curve Cryptosystems [pdf]
  • Elliptic Curve Cryptosystems on Reconfigurable Hardware [pdf]

  • Free Books on Cryptography Free Books on Cryptography Free Books on Cryptography Free Books on Cryptography Free Books on Cryptography Free Books on Cryptography Free Books on Cryptography Free Books on Cryptography Free Books on Cryptography

    AddThis Social Bookmark Button

    0 Comments: