Cryptography resource collection

  • A Cryptography Tutorial [summary,pdf(1,2,3,4,5,6,7,8)]
  • Another Cryptography tutorial [pdf(1,2,3,4,5,6,7)]
  • Cryptography - The myths [pdf]
  • A Cryptograpgic Compendium [link]
  • Frequently Asked Questions about Today's Cryptography by RSA Laboratories [pdf]
  • Security protocols overview by RSA Laboratories [pdf]
  • Security Pitfalls in Cryptography [pdf]
  • Stream ciphers [pdf]
  • Understanding Public Key Infrastructure [pdf]
  • Trust Models and Management in Public-Key Infrastuctured [pdf]
  • Why Cryptography is Harder than it looks [pdf]
  • Cryptanalytic Attacks on Pseudorandom Number Generators [pdf]
  • CryptoBytes, RSA newsletter [pdf(1-1,1-2,1-3,2-1,2-2,2-3,3-1,3-2,4-1,4-2)]
  • RSA Laboratories' Bulletin [pdf(1,2,3,4,5,6,7,8,9,10,11,12,13)]
  • Smartcard security [pdf]
  • Digital Signatures, Certificates and Electronic Commerce [pdf]
  • Key recovery - Meeting the Needs of Users or Key Escrow in Disguise [pdf]
  • Implementation Experience with AES Candidate Algorithms [pdf]
  • Performance Analysis of AES candidates on the 6805 CPU core [pdf]
  • UK Government Organisations Involved in Communications and Information Systems Security [pdf]
  • The block cipher Square [pdf]
  • Attacks on Cryptoprocessor Transaction Sets [pdf]
  • Initial Cryptanalysis of the RSA SecurID Algorithm [pdf]
  • Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent [pdf]
  • Preliminary Cryptanalysis of Reduced-Round Serpent [pdf]
  • Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML [pdf]
  • Compliance Defects in Public-Key Cryptography [pdf]
  • Architectural considerations for cryptanalytic hardware [pdf]
  • WEP Fix using RC4 Fast Packet Keying [pdf]
  • RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4 [pdf]
  • Block Ciphers [pdf]
  • Stream Ciphers [pdf]
  • C.R.I.S.I.S. - Cryptography's Role In Securing the Information Society [pdf]
  • Universal Hashing and Multiple Authentication [pdf]
  • Timing Analysis of Keystrokes and Timing Attacks on SSH [pdf]
  • The simple ideal cipher system [pdf]
  • An FPGA Implementation of the Linear Cruptanalysis [pdf]
  • The math behind the RSA cipher [txt]
  • RSA hardware implementation [pdf]
  • High-Speed RSA implementation [pdf]
  • Are 'Strong' Primes Needed for RSA? [pdf]
  • RSAES-OAEP Encryption scheme [pdf]
  • Has the RSA algorithm been compromised as a result of Bernstein's Papar? [pdf]
  • Are 'Strong' Primed Needed for RSA? [pdf]
  • Why Textbook ElGamal and RSA Encryption are Insecure [pdf]
  • The DES algorithm [txt]
  • The RC5 encryption algorithm [pdf]
  • On The Security of the RC5 Encryption Algorithm [pdf]
  • The ESP RC5-CBC Transform [txt]
  • The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms [txt]
  • The RC6 block cipher [pdf]
  • RC6 as the AES [pdf]
  • The security of RC6 block cipher [pdf]
  • Statistical testing of RC6 block cipher [pdf]
  • The Rijndael Block Cipher [pdf]
  • A Specification of Rijndael, the AES Algorithm [pdf]
  • Efficient Implementation of the Rijndael S-box [pdf]
  • The Elliptic Curve Cryptosystem [pdf]
  • Elliptic Curce Cryptosystems [pdf]
  • Elliptic Curve Cryptography, Future Resiliency and High Security Systems [pdf]
  • The Elliptic Curve Cryptosystem for Smart Cards [pdf]
  • The Elliptic Curve Digital Signature Algorithm (ECDSA) [pdf]
  • Recommendation on Elliptic Curve Cryptosystems [pdf]
  • Elliptic Curve Cryptosystems on Reconfigurable Hardware [pdf]