Friday, December 15, 2006

Operatinf system Cryptography

Introduction to OS [pdf]

Process scheduling [pdf]

Resource management and deadlocks [pdf]

I/O Management [pdf]

Filesystem [pdf]

Memory management [pdf]

Interprocess communication [pdf]

System security [pdf]


A Cryptography Tutorial [summary,pdf(1,2,3,4,5,6,7,8)]

Another Cryptography tutorial [pdf(1,2,3,4,5,6,7)]

Cryptography - The myths [pdf]

A Cryptograpgic Compendium [link]

Frequently Asked Questions about Today's Cryptography by RSA Laboratories [pdf]

Security protocols overview by RSA Laboratories [pdf]

Security Pitfalls in Cryptography [pdf]

Stream ciphers [pdf]

Understanding Public Key Infrastructure [pdf]

Trust Models and Management in Public-Key Infrastuctured [pdf]

Why Cryptography is Harder than it looks [pdf]

Cryptanalytic Attacks on Pseudorandom Number Generators [pdf]

CryptoBytes, RSA newsletter [pdf(1-1,1-2,1-3,2-1,2-2,2-3,3-1,3-2,4-1,4-2)]

RSA Laboratories' Bulletin [pdf(1,2,3,4,5,6,7,8,9,10,11,12,13)]

Smartcard security [pdf]

Digital Signatures, Certificates and Electronic Commerce [pdf]

Key recovery - Meeting the Needs of Users or Key Escrow in Disguise [pdf]

Implementation Experience with AES Candidate Algorithms [pdf]

Performance Analysis of AES candidates on the 6805 CPU core [pdf]

UK Government Organisations Involved in Communications and Information Systems Security [pdf]

The block cipher Square [pdf]

Attacks on Cryptoprocessor Transaction Sets [pdf]

Initial Cryptanalysis of the RSA SecurID Algorithm [pdf]

Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent [pdf]

Preliminary Cryptanalysis of Reduced-Round Serpent [pdf]

Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML [pdf]

Compliance Defects in Public-Key Cryptography [pdf]

Architectural considerations for cryptanalytic hardware [pdf]

WEP Fix using RC4 Fast Packet Keying [pdf]

RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4 [pdf]

Block Ciphers [pdf]

Stream Ciphers [pdf]

C.R.I.S.I.S. - Cryptography's Role In Securing the Information Society [pdf]

Universal Hashing and Multiple Authentication [pdf]

Timing Analysis of Keystrokes and Timing Attacks on SSH [pdf]

The simple ideal cipher system [pdf]

An FPGA Implementation of the Linear Cruptanalysis [pdf]

The math behind the RSA cipher [txt]

RSA hardware implementation [pdf]

High-Speed RSA implementation [pdf]

Are 'Strong' Primes Needed for RSA? [pdf]

RSAES-OAEP Encryption scheme [pdf]

Has the RSA algorithm been compromised as a result of Bernstein's Papar? [pdf]

Are 'Strong' Primed Needed for RSA? [pdf]

Why Textbook ElGamal and RSA Encryption are Insecure [pdf]

The DES algorithm [txt]

The RC5 encryption algorithm [pdf]

On The Security of the RC5 Encryption Algorithm [pdf]

The ESP RC5-CBC Transform [txt]

The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms [txt]

The RC6 block cipher [pdf]

RC6 as the AES [pdf]

The security of RC6 block cipher [pdf]

Statistical testing of RC6 block cipher [pdf]

Blowfish algorithm in plain English [txt]

Source code for Blowfish implementation [zip(C++,Another C++,Java,ANSI C,Another ANSI C,Forth,Pascal)]

Twofish: A 128-bit Block Cipher [pdf]

Upper bounds on differential characteristics in Twofish [pdf]

Impossible differentials in Twofish [pdf]

A Twofish retreat: Related-Key attacks against Reduced-Round Twofish [pdf]

Further observations on the Key Schedule of Twofish [pdf]

Empirical verification of Twofish key uniqueness properties [pdf]

Key separation in Twofish [pdf]

Improved Twofish implementations [pdf]

Implementation of the Twofish Cipher using FPGA devices [pdf]

Source code for Twofish implementation [zip(6805(Smartcard),Z80,Reference C code,ANSI C and i386 asm,Optimised ANSI C,Optimised C code [Linux code],Visual Basic,Java)]

The Rijndael Block Cipher [pdf]

A Specification of Rijndael, the AES Algorithm [pdf]

Efficient Implementation of the Rijndael S-box [pdf]

The Elliptic Curve Cryptosystem [pdf]

Elliptic Curce Cryptosystems [pdf]

Elliptic Curve Cryptography, Future Resiliency and High Security Systems [pdf]

The Elliptic Curve Cryptosystem for Smart Cards [pdf]

The Elliptic Curve Digital Signature Algorithm (ECDSA) [pdf]

Recommendation on Elliptic Curve Cryptosystems [pdf]

Elliptic Curve Cryptosystems on Reconfigurable Hardware [pdf]

No comments: