_""^^"-. / / \ \ | |.-""-.| ___ ___ _____ _____ ___ ___ ////`.;;;;.`\ | _ \ __|_ _|_ _| __| _ \\ |||; ::/ \:: ; | / _| | | | | | _|| / |||; ::\__/:: ; |_|_\___| |_| |_| |___|_|_\\ \\\\ ';;;;' / Cryptography & Security moves fast. Keep up! `==':-..-'` http://maciejczyzewski.me/retter By: M. A. Czyzewski Date: 06/03/2017 This code is explicitly placed into the public domain.
[COURSES | LIBRARIES | TOOLS | ALGORITHMS | CONFERENCES | CRYPTOGRAPHERS | ORGANIZATIONS & GROUPS]
NOTE: If you see mistakes, expired links or would like to expand the list with your own bookmarks. Feel free to contribute to this project! If you want to know more about this project, please read the README. List below is still in the process of creation...
Cryptography is a highly interdiscplinary area; calling on expertise in Pure Mathematics, Computer Science and Electronic Engineering. At Bristol we cover the full range of these topics and as such our students come with a variety of backgrounds and need to understand a diverse range of topics.
This book is about exactly that; constructing practical cryptosystems for which we can argue security under plausible assumptions. The book covers many constructions for different tasks in cryptography.
The topics covered in this course include interactive proofs, zero-knowledge proofs, zero-knowledge proofs of knowledge, non-interactive zero-knowledge proofs, secure protocols, two-party secure computation, multiparty secure computation, and chosen-ciphertext security.
Good for beginners course on computer security basics.
Is an introductory course on cryptography, freely available for programmers of all ages and skill levels.
A short note on the topics of security and cryptography.
This course features a rigorous introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public-key encryption, digital signatures, pseudo-random number generation, and basic protocols and their computational complexity requirements.
Cryptography is an indispensable tool for protecting information in computer systems. This course explains the inner workings of cryptographic primitives and how to correctly use them. Students will learn how to reason about the security of cryptographic constructions and how to apply this knowledge to real-world applications.
This site provides order information, updates, errata, supplementary information, chapter bibliographies, and other information for the Handbook of Applied Cryptography by Menezes, van Oorschot and Vanstone.
Kali is a Debian-derived Linux distribution designed for digital forensics and penetration testing. This site should help to understand basics.
Course include an extensive range of knowledge about modern cryptography.
This is a different way to learn about crypto than taking a class or reading a book. Course give you problems to solve. They're derived from weaknesses in real-world systems and modern cryptographic constructions.
This mini-course was taught in 2007 at Google. It is intended to be a brief survey for a general technical audience.
The list below is a little outdated and confused. However, if you know some interesting algorithm, or you are the creator of it. You can add here a few information.
See comparison of cryptographic hash functions or list of the best for uniqueness and speed hashing algorithms.
Below is a list of notes to algorithms including: description, implementations, cryptoanalysis and materials. It should be a summary of the most important information, with an emphasis on attacks and interesting bookmarks. (in catalogs should be placed useful scripts)
Mihir Bellare conducts calendar, which is often updated, also worth a look at IEEE Cipher's.
See current list of call for papers.MAJOR
Places where people share their interest in tinkering with technology, meet and work on their projects, and learn from each other.
Is a non-profit scientific organization whose purpose is to further research in cryptology and related fields. Cryptology is the science and practice of designing computation and communication systems which are secure in the presence of adversaries.
The mission of the IETF is to make the Internet work better by producing high quality, relevant technical documents that influence the way people design, use, and manage the Internet.
Since 1975, the USENIX Association has brought together the community of engineers, system administrators, scientists, and technicians working on the cutting edge of the computing world.
#crypto & #security