Cryptography Cryptoanalys RSA Cryptography Math RSA Math Steganography

Cryptography


This Page was made
by Thoroughout surfing the Internet
and downloading most of the PDFs
and making Link Collections
from Internet Explorer Favorites


Link Collections

[Cryptography Link Collections]
[CryptoAnalysis Link Collections]
[Cryptography & Math Link Collections]
[Math Link Collections]



Introductory Tutorials to Cryptography

Very Excellent SlideShows

[Basics_of_Cryptography.pdf]
[Introduction_to_Cryptography_Helger_Lipmaa.pdf]
[Introduction_to_cryptography_No_II.pdf]
[Lattice_Based_Cryptography.pdf]

Excellent

[An_Introduction_to_Cryptography_and_Digital_Signatures.pdf]
[An_Overview_of_Cryptography.pdf]
[Cryptography_Tom_Davis.pdf]
[Essay_15_Cryptography.pdf]

PDF Books and Sample Chapters

[Chapter_5_Cryptography.pdf]
[Chapter_8_Cryptography.pdf]
[An_Introduction_to_Cryptography.pdf]
[An_Introduction_to_Cryptography_PGP.pdf]

Reviews and Historical Aspects of Cryptography

[Cryptography_1990-2010_Ueli_Maurer.pdf]

Social Aspects of Cryptography

[Government,_Cryptography,_and_the_Right_To_Privacy.pdf]
[Cryptography_and_Democracy_Dilemmas_of_Freedom.pdf]

More Advanced Tutorials

[The_Laws_of_Cryptography_with_Java_Code.pdf]
[Applied_Cryptography.pdf]
[HANDBOOK_of_APPLIED_CRYPTOGRAPHY.pdf]
[Introduction_to_Cryptography_89-656.pdf]
[Cryptography_David_R_Kohel.pdf]
[Lecture_Notes_on_Cryptography.pdf]
[Notes_on_cryptography.pdf]
[Password_Based_Cryptography.pdf]
[Some_Applications_of_Coding_Theory_in_Cryptography.pdf]
[Lattice-based_Cryptography.pdf]

Open Source Cryptography

General

[A SMART-GENTRY BASED SOFTWARE SYSTEM FOR
SECRET PROGRAM EXECUTION.pdf
]
[A Tale of Two Open Source Cryptography Projects.pdf]
[An Implementation of the Fully Homomorphic.pdf]
[An Open-source Cryptographic Coprocessor.pdf]
[An Unauthorised Guide to PGP Cryptography.pdf]
[BitLocker To Go User Guide.pdf]
[Can We Trust Cryptographic Software.pdf]
[DDPE-BitLocker-Manager-Spec-Sheet.pdf]
[How Drive Encryption Works.pdf]
[Keyczar A Cryptographic Toolkit.pdf]
[Open-Source Cryptographic Libraries and Embedded Platforms.pdf]
[Password Recovery Kit Forensic 12,5.pdf]
[PGP Software Developer’s Kit Reference Guide.pdf]
[Practical Methods for Dealing with Full Disk Encryption.pdf]
[Roll Your Own Crypto Services (Using Open Source and Free Cryptography).pdf]
[Secret Program Execution in the Cloud Applying Homomorphic Encryption.pdf]
[Secure Programming for Linux and Unix HOWTO.pdf]
[Symmetric Cryptography in Javascript.pdf]
[The Hidden Costs of Microsoft BitLocker.pdf]
[Why Free Endpoint Encrypt ion Is Not Good.pdf]
[Windows 7 BitLocker Drive Encryption.pdf]

GNU Privacy Guard

General

[A primer in Public Key cryptography, PGP and GPG.pdf]
[Applications of Cyber Engineering GNU Privacy Guard.pdf]
[Can We Trust Cryptographic Software Cryptographic Flaws in GNU Privacy Guard v1,2,3.pdf]
[Chapter 2 GNU Privacy Guard.pdf]
[EnigMai openpgp email security for mozilla applicationsl.pdf]
[GBDE - GEOM Based Disk Encryption.pdf]
[GNU Privacy Guard (GPG) v1,0,x Command Summary.pdf]
[GNU Privacy Guard and Cryptography Part 2.pdf]
[GNU Privacy Guard Howto.pdf]
[GPG - encryption and signing.pdf]
[Lab Project on using PGP – GNU Privacy Guard (GPG) for Secure E-mai.pdf]
[Laboratory assignment 1 Gnu Privacy Guard (GPG).pdf]
[MOVEit CENTRAL OpenPGP option.pdf]
[The Libgcrypt Reference Manual.pdf]
[Using GNU Privacy Guard.pdf]
[Using the GNU Privacy Guard 2.pdf]

ElGamal Encryption

[A Public Key Cryptosystem and a Signature Scheme Based
on Discrete Logarithms.pdf
]
[An implementation of RSA and ElGamal PKCs using Java BigInteger class.pdf]
[Distributed Blinding for Distributed ElGamal Re-encryption.pdf]
[ElGamal cryptosystem.pdf]
[Implementing several attacks on plain ElGamal encryption (2).pdf]
[Implementing several attacks on plain ElGamal encryption.pdf]
[Meier Andreas The ElGamal Cryptosystem.pdf]
[On the Security of ElGamal Based Encryption.pdf]
[Security of Signed ElGamal Encryption.pdf]

Web of Trust

[A Model of Unforgeable Digital Certificate Document System.pdf]
[A New Approach to PGP’s Web of Trust.pdf]
[A New Approach to PGP’sWeb of Trust.pdf]
[An Algebra for Assessing Trust in Certification Chains.pdf]
[Building a Web of Trust.pdf]
[FEDERAL PLAN for CYBER SECURITY AND INFORMATION
ASSURANCE RESEARCH AND DEVELOPMENT.pdf
]
[Getting started in the Web of Trust.pdf]
[Global Information Assurance Certification Paper.pdf]
[IBM WebSphere Partner Gateway V6,2,1 Advanced
and Enterprise Editions OpenPGP.pdf
]
[KeyChains A Decentralized Public-Key Infrastructure.pdf]
[Macro- and Micro-structure of Trust Networks.pdf]
[Merging and Extending the PGP and PEM Trust Models
- The ICE-TEL Trust Mod.pdf
]
[Overview of Certification Systems X,509, CA, PGP and SKIP.pdf]
[PGP Key Management.pdf]
[Public Key Infrastructures - PGP vs, X,509.pdf]
[Resilience of the PGP “web of trust” and the disruption of criminal networks.pdf]
[This is a Chapter from the Handbook of Applied Cryptography.pdf]
[TRUST FORMATION BASED ON SUBJECTIVE LOGIC AND PGP WEB-OF
-TRUST FOR INFORMATION SHARING IN MOBILE AD-HOC NETWORK.pdf
]
[Using PGP to Verify Digital Signatures.pdf]

Types of Cryptography and Cryptographic Standards

Public Key Cryptography

[Public-Key_Cryptography_Theory_and_Practice.pdf]
[Hardware_Architectures_for_Public_Key_Cryptography.pdf]
[Certificateless_Public_Key_Cryptography.pdf]
[FEDERAL_INFORMATION_PROCESSING_STANDARDS
_PUBLICATION_ENTITY_AUTHENTICATION
USING_PUBLIC_KEY_CRYPTOGRAPHY.pdf
]

Eliptic Curve Cryptography

[A_tutorial_of_elliptic_curve_cryptography.pdf]
[AUTOIDLABS_Elliptic_Curve_Cryptography.pdf]
[Elliptic_Curve Cryptography_Good_Enough_for_Government_Work.pdf]
[Elliptic_Curve_Cryptography_Ning_Shang.pdf]
[Elliptic_Curve_Cryptosystem_and_its_Applications.pdf]
[Guide_to_Elliptic_Curve_Cryptography.pdf]
[Introduction_to_Elliptic_Curve_Cryptography.pdf]
[Simple_Tutorial_on_Elliptic_Curve_Cryptography.pdf]
[STANDARDS_FOR_EFFICIENT_CRYPTOGRAPHY_Elliptic_Curve_Cryptography.pdf] [STANDARDS_FOR_EFFICIENT_CRYPTOGRAPHY_Elliptic_Curve_Cryptography.pdf]

Quantum Cryptography

[A Quick Glance at Quantum Cryptography.pdf]
[The_Future_of_Cryptography_Under_Quantum_Computers.pdf]
[Quantum_Cryptography_in_Practice.pdf]

Cryptographic Software and Hardvare

[Plugable_LibTomCrypt.pdf]

TLS and SSL

[Analysis of the SSL 3,0 protocol.pdf]
[Directions for Enabling TLS 1.0 for Internet Explorer, Firefox, Safari, and Chrome.pdf]
[Enabling TLS 1,0 for Online Payment.pdf]
[How to Enable TLS 1.0 in Internet Explorer, FIREFOX & SAFARI.pdf]
[MS-TLSP - Transport Layer Security (TLS) Profile.pdf]
[Notes on Transport Layer Security.pdf]
[OpenSSL Security Policy.pdf]
[OpenSSL User Guide.pdf]
[Standard Group MAC Addresses A Tutorial Guide.pdf]
[The Most Dangerous Code in the World - Validating SSL
Certificates in Non-Browser Software.pdf
]

SFTP and FTPES

[Filöverforing med SFTP.pdf]
[How to Set Up an FTPES Connection.pdf]

Tutorials

[Implementation Guidance for FIPS PUB 140-2
and the Cryptographic Module Validation Program.pdf
]
[Name-based SSL virtual hosts - how to tackle the problem.pdf]
[New Tricks For Defeating SSL In Practice.pdf]
[Secure Socket Layer (SSL) and Transport Layer Security (TLS).pdf]
[TLS Renegotiation Vulnerability.pdf]
[Transport Layer Security (TLS) About TLS.pdf]
[Understanding SSL and TLS.pdf]

(SHA) Secure Hash Algorithm

[A Novel Secure.pdf]
[cast_sha256-a.pdf]
[ch12.pdf]
[Draft-FIPS180-4_Feb2011.pdf]
[Finding Collisions in the Full SHA-1.pdf]
[H0664951.pdf]
[hash.pdf]
[l_11chf.pdf]
[Lecture15.pdf]
[March2009_cryptographic-hash-algorithm-family.pdf]
[Secure_Hash_Algorithm.pdf]
[SHA_All.pdf]
[SHA_interface.pdf]
[SHA-1_Deprecated.pdf]
[sha2.pdf]
[SHA256.pdf]
[SHA512.pdf]
[SHA512_224.pdf]
[SHAVS.pdf]

RC4 - Stream Cipher

[(Non-)Random Sequences from (Non-)Random Permutations
- Analysis of RC4 stream cipher.pdf
]
[(Not So) Random Shufles of RC4.pdf]
[A New Variant of RC4 Stream Cipher.pdf]
[A New Weakness in the RC4 Keystream Generator and
an Approach to Improve the Security of the Cipher.pdf
]
[A Pragmatic Study on Different Stream Ciphers
And On Different Flavors of RC4 Stream Cipher.pdf
]
[An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks.pdf]
[AN RC4 BASED LIGHT WEIGHT SECURE PROTOCOL FOR SENSOR NETWORKS.pdf]
[Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANs.pdf]
[Cryptanalysis of RC4-like Ciphers.pdf]
[Design and Analysis of RC4-like Stream Ciphers.pdf]
[Design and Simulation of Enhancing
RC4 Stream Cipher for Wi-Fi Security using Verilog HDL.pdf
]
[Energy, performance, area versus security trade-offs for stream ciphers.pdf]
[Finding an internal state of RC4 stream cipher.pdf]
[Four Lines of Design to Forty Papers of Analysis - The RC4 Stream Cipher.pdf]
[Full Plaintext Recovery Attack on Broadcast RC4.pdf]
[Hardware Implementation of Modified RC4 Stream Cipher Using FPGA.pdf]
[Internal-State Reconstruction of a Stream Cipher RC4.pdf]
[Introduction to Modern Cryptography - Stream Ciphers.pdf]
[Key Collisions of the RC4 Stream Cipher.pdf]
[Linear Statistical Weakness of Alleged RC4 Keystream Generator.pdf]
[PC1-RC4 and PC2-RC4 Algorithms Pragmatic Enrichment
Algorithms to Enhance RC4 Stream Cipher Algorithm.pdf
]
[RC4 stream cipher and possible attacks on WEP.pdf]
[Reducing the State Space of RC4 Stream Cipher.pdf]
[Some Thoughts about Implementation Properties of Stream Ciphers.pdf]
[SPECIALIZED COPROCESSOR FOR IMPLEMEBNTING THE RC4 STREAM CIPHER.pdf]
[Statistical Analysis of the Alleged RC4 Keystream Generator.pdf]
[The Most Efficient Distinguishing Attack on VMPC and RC4A.pdf]
[Towards a General RC4-like Keystream Generator.pdf]
[Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers.pdf]
[Weaknesses in the Key Scheduling Algorithm of RC4.pdf]
[VMPC One-Way Function and Stream Cipher.pdf]
[(Not So) Random Shufles of RC4.pdf]
[A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher.pdf]
[Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator.pdf]
[Analysis of RC4 and Proposal of Additional Layers for Better Security Margin.pdf]
[Breaking 104 bit WEP in less than 60 seconds.pdf]
[On the Design and Security of RC2.pdf]
[Statistical Analysis of the Alleged RC4 Keystream Generator.pdf]
[The Most Efficient Distinguishing Attack on VMPC and RC4A.pdf]
[Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers.pdf]
[VMPC One-Way Function and Stream Cipher.pdf]

Tutorials

[Attack on Broadcast RC4 Revisited .pdf]
[Different attacks on the RC4 stream cipher.pdf]
[Introduction to Cryptography - The RC4 Stream Cipher.pdf]
[Key Collisions of the RC4 Stream Cipher.pdf]
[Near-colliding Keys in RC4.pdf]
[RC4 (2).pdf]
[Simplified RC4 Example.pdf]
[Stream Ciphers - RC4.pdf]
[The ISAAC Stream Cipher.pdf]
[THE RC4 STREAM ENCRYPTION ALGORITHM.pdf]
[Today.pdf]

Papers and Journal Articles In General

[A Hardware implementation of Winograd Fourier Transform algorithm for Cryptography.pdf]
[Bridging_Game_Theory_and_Cryptography_Recent_Results_and_Future_Directions.pdf]
[Cryptography_As_An_Operating_System_Service_A_Case_Study.pdf]
[Cryptography_from_Anonymity.pdf]
[Cryptography_in_Theory_and_Practice_The_Case_of_Encryption_in_IPsec.pdf]
[CryptoLib Cryptography in Software.pdf]
[DESIGN_OF_A_NEW_SECURITY
_PROTOCOL_USING_HYBRID_CRYPTOGRAPHY_ALGORITHMS.pdf
]
[Leakage-Resilient_Cryptography.pdf]
[New_Directions_in_Cryptography.pdf]
[Proxy_Cryptography_Revisited.pdf]
[Reconciling_Two_Views_of_Cryptography.pdf]

Dissertations and Thesis In Cryptography

[Cryptography_and_Evidence.pdf]
[Case_Studies_in_Symmetric_Key_Cryptography.pdf]

Miscellenea

[Computational_Complexity_A_Modern_Approach.pdf]
[Cryptography-Business_Value_Behind_the_Myth.pdf]
[Group-based_cryptography.pdf]
[Hierarchical_ID-Based_Cryptography.pdf]

 

 

 


Cryptography Cryptoanalys RSA Cryptography Math RSA Math Steganography

Valid HTML 4.01 Transitional