Cryptography
P-Lab - a Server on the Theory and Practice of Random Number Generation
Algorithms
Twofish
Blowfish
The Block Cipher Lounge
Old TEA (Tiny Encryption Algorithm) - by R M Needham and D J Wheeler
CAST-128
AES
Rijndael
Serpent
MARS
The Blum, Shub & Smale model - a weak version
List of Encryption Algorithms
Crypto++ 3.1 - library with RC6, MARS, Rijndael, Twofish, Serpent...
RSA
RSA Security
Cryptography and Security
Cryptography and Security Links - excellent resource
Cryptographic random numbers - by C. Ellison
Online resources for collecting and processing crypto-strength randomness
A list of commonly used cryptographic algorithms and methods - with references...
Cryptography - the study of encryption
Why Cryptography Is Harder Than It Looks (Counterpane)
Twofish on FPGAs (Counterpane)
Encryption Tools - at software-tools
www.cryptography.org
A bias in RC4
Cryptologica
Cryptographic Algorithms
Cryptography, Cryptographic Protocols and Methods
Encryption and Security-related Resources - "the crypto link farm"
Using and Creating Cryptographic-Quality Random Numbers
Steganography
Steganography Info and Archive
StirMark - Image Watermarking Robustness Test
Keith Lockstone's home page
Bibliography
Bibliography of online papers - Counterpane
People
Terry Ritter - "Ciphers by Ritter" pages
David Wagner
Gregory Chaitin - home page
Alan Turing
John Savard - cryptography pages
J. Peschel
David A. Scott
M. K. Shen
Eli Biham
UK
GCHQ
UK laws
Bletchley Park
Bletchley Park - at Cranfield
Glossary
Ritter's Glossary
A Glossary
Underground crypto glossary
Fast encryption
BestCrypt
Mercy - Paul Crowley (old link)
FAQs
RSA Labs FAQ
Cryptography FAQ
sci.crypt.research FAQ
RSA Cryptography FAQ
Snake Oil Warning Signs: Encryption Software to Avoid
Misc
Cryptonym
"Pseudo" one time pads - oh dear
File Safety - "for when PGP is just not good enough"...
Casio's "Multi-Dimensional Space Rotation (TM)" encryption
The Gold Bug - Edgar Allen Poe
Echelon Watch
The "frog" encryption algorithm
Method and Apparatus for the Encryption, Decryption and Authentication of Messages Using Dynamical Systems - Hooward A. Gutowitz
The American Cryptogram Association - ACA
Kremlin
cr.yp.to - index page
Shannon's original paper
Java
Cryptix - Java Cryptography Extension "clean room"
Bouncy Castle
Java Cryptography Extension (clean room)
Java Cryptography - the book
J/CRYPTO v4.0 - "Professional Cryptography Classes for Java Developers"
Books and book reviews
Applied Cryptography
Java Cryptography
Handbook of Applied Cryptography - online
Foundations of Cryptography - fragments of a book - online
A good book
Quick reviews of 30 cryptography books
Aegean Park Press - serious texts on cryptanalysis
Links
"Freeswan" crypto links
Our random number links
Our cryptanalysis links
Our bent function links
Our quasi-random number links
Our prime number links
|