Cryptography links

Cryptography

P-Lab - a Server on the Theory and Practice of Random Number Generation

Algorithms

Twofish
Blowfish
The Block Cipher Lounge
Old TEA (Tiny Encryption Algorithm) - by R M Needham and D J Wheeler
CAST-128
AES
Rijndael
Serpent
MARS
The Blum, Shub & Smale model - a weak version
Crypto++ 3.1 - library with RC6, MARS, Rijndael, Twofish, Serpent...
RSA
RSA Security

Cryptography and Security

Cryptography and Security Links - excellent resource
Cryptographic random numbers - by C. Ellison
Online resources for collecting and processing crypto-strength randomness
A list of commonly used cryptographic algorithms and methods - with references...
Cryptography - the study of encryption
Why Cryptography Is Harder Than It Looks (Counterpane)
Twofish on FPGAs (Counterpane)
Encryption Tools - at software-tools
www.cryptography.org
A bias in RC4
Cryptologica
Cryptographic Algorithms
Cryptography, Cryptographic Protocols and Methods
Encryption and Security-related Resources - "the crypto link farm"
Using and Creating Cryptographic-Quality Random Numbers

Steganography

Steganography Info and Archive
StirMark - Image Watermarking Robustness Test
Keith Lockstone's home page

Public Key Cryptography

Public Key Cryptography - an introduction
Public keys - in particular, RSA
Public Key Cryptography - an introduction

Elliptic curve cryptography

RSA introduction
RSA recommendations
RSA ECC FAQ
Certicom's ECC pages
Detailed tutorial - from Certicom
A good beginning
The bible - with thanks to M. Joye
Maths
A Thesis
The history of elliptic curves
Implementations

Bibliography

Bibliography of online papers - Counterpane

People

Terry Ritter - "Ciphers by Ritter" pages
Gregory Chaitin - home page
Alan Turing
John Savard - cryptography pages
J. Peschel
David A. Scott
M. K. Shen

UK

GCHQ
UK laws
Bletchley Park
Bletchley Park - at Cranfield

Glossary

Ritter's Glossary
A Glossary
Underground crypto glossary

Fast encryption

BestCrypt
Mercy - Paul Crowley

FAQs

RSA Labs FAQ
Cryptography FAQ
sci.crypt.research FAQ
RSA Cryptography FAQ
Snake Oil Warning Signs: Encryption Software to Avoid

Misc

Cryptonym
"Pseudo" one time pads - oh dear
File Safety - for when PGP is just not good enough...
Casio's "Multi-Dimensional Space Rotation (TM)" encryption
The Gold Bug - Edgar Allen Poe
Echelon Watch
The "frog" encryption algorithm
Method and Apparatus for the Encryption, Decryption and Authentication of Messages Using Dynamical Systems - Hooward A. Gutowitz
The American Cryptogram Association - ACA
Kremlin
cr.yp.to - index page

Java

Open JCE
Cryptix - Java Cryptography Extension "clean room"
Java Cryptography Extension (clean room)
Java Cryptography - the book
J/CRYPTO v4.0 - "Professional Cryptography Classes for Java Developers"

Books and book reviews

Applied Cryptography
Java Cryptography
Handbook of Applied Cryptography - online
Foundations of Cryptography - fragments of a book - online
A good book
Quick reviews of 30 cryptography books
Aegean Park Press - serious texts on cryptanalysis

Links

Our random number links
Our cryptanalysis links
Our bent function links
Our quasi-random number links
Our prime number links


tim@tt1.org | http://mandala.co.uk/