Introduction to OS [pdf]
Process scheduling [pdf]
Resource management and deadlocks [pdf]
I/O Management [pdf]
Filesystem [pdf]
Memory management [pdf]
Interprocess communication [pdf]
System security [pdf]
Cryptography
A Cryptography Tutorial [summary,pdf(1,2,3,4,5,6,7,8)]
Another Cryptography tutorial [pdf(1,2,3,4,5,6,7)]
Cryptography - The myths [pdf]
A Cryptograpgic Compendium [link]
Frequently Asked Questions about Today's Cryptography by RSA Laboratories [pdf]
Security protocols overview by RSA Laboratories [pdf]
Security Pitfalls in Cryptography [pdf]
Stream ciphers [pdf]
Understanding Public Key Infrastructure [pdf]
Trust Models and Management in Public-Key Infrastuctured [pdf]
Why Cryptography is Harder than it looks [pdf]
Cryptanalytic Attacks on Pseudorandom Number Generators [pdf]
CryptoBytes, RSA newsletter [pdf(1-1,1-2,1-3,2-1,2-2,2-3,3-1,3-2,4-1,4-2)]
RSA Laboratories' Bulletin [pdf(1,2,3,4,5,6,7,8,9,10,11,12,13)]
Smartcard security [pdf]
Digital Signatures, Certificates and Electronic Commerce [pdf]
Key recovery - Meeting the Needs of Users or Key Escrow in Disguise [pdf]
Implementation Experience with AES Candidate Algorithms [pdf]
Performance Analysis of AES candidates on the 6805 CPU core [pdf]
UK Government Organisations Involved in Communications and Information Systems Security [pdf]
The block cipher Square [pdf]
Attacks on Cryptoprocessor Transaction Sets [pdf]
Initial Cryptanalysis of the RSA SecurID Algorithm [pdf]
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent [pdf]
Preliminary Cryptanalysis of Reduced-Round Serpent [pdf]
Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML [pdf]
Compliance Defects in Public-Key Cryptography [pdf]
Architectural considerations for cryptanalytic hardware [pdf]
WEP Fix using RC4 Fast Packet Keying [pdf]
RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4 [pdf]
Block Ciphers [pdf]
Stream Ciphers [pdf]
C.R.I.S.I.S. - Cryptography's Role In Securing the Information Society [pdf]
Universal Hashing and Multiple Authentication [pdf]
Timing Analysis of Keystrokes and Timing Attacks on SSH [pdf]
The simple ideal cipher system [pdf]
An FPGA Implementation of the Linear Cruptanalysis [pdf]
The math behind the RSA cipher [txt]
RSA hardware implementation [pdf]
High-Speed RSA implementation [pdf]
Are 'Strong' Primes Needed for RSA? [pdf]
RSAES-OAEP Encryption scheme [pdf]
Has the RSA algorithm been compromised as a result of Bernstein's Papar? [pdf]
Are 'Strong' Primed Needed for RSA? [pdf]
Why Textbook ElGamal and RSA Encryption are Insecure [pdf]
The DES algorithm [txt]
The RC5 encryption algorithm [pdf]
On The Security of the RC5 Encryption Algorithm [pdf]
The ESP RC5-CBC Transform [txt]
The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms [txt]
The RC6 block cipher [pdf]
RC6 as the AES [pdf]
The security of RC6 block cipher [pdf]
Statistical testing of RC6 block cipher [pdf]
Blowfish algorithm in plain English [txt]
Source code for Blowfish implementation [zip(C++,Another C++,Java,ANSI C,Another ANSI C,Forth,Pascal)]
Twofish: A 128-bit Block Cipher [pdf]
Upper bounds on differential characteristics in Twofish [pdf]
Impossible differentials in Twofish [pdf]
A Twofish retreat: Related-Key attacks against Reduced-Round Twofish [pdf]
Further observations on the Key Schedule of Twofish [pdf]
Empirical verification of Twofish key uniqueness properties [pdf]
Key separation in Twofish [pdf]
Improved Twofish implementations [pdf]
Implementation of the Twofish Cipher using FPGA devices [pdf]
Source code for Twofish implementation [zip(6805(Smartcard),Z80,Reference C code,ANSI C and i386 asm,Optimised ANSI C,Optimised C code [Linux code],Visual Basic,Java)]
The Rijndael Block Cipher [pdf]
A Specification of Rijndael, the AES Algorithm [pdf]
Efficient Implementation of the Rijndael S-box [pdf]
The Elliptic Curve Cryptosystem [pdf]
Elliptic Curce Cryptosystems [pdf]
Elliptic Curve Cryptography, Future Resiliency and High Security Systems [pdf]
The Elliptic Curve Cryptosystem for Smart Cards [pdf]
The Elliptic Curve Digital Signature Algorithm (ECDSA) [pdf]
Recommendation on Elliptic Curve Cryptosystems [pdf]
Elliptic Curve Cryptosystems on Reconfigurable Hardware [pdf]
No comments:
Post a Comment