|
Articles and Papers
Articles
-
Adam Back's Home Page
Various intriguing items related to cryptography.
-
Cryptography FAQ
A what's what on cryptography and cryptology.
-
History of Cryptography
A thorough overview of cryptography's past and present.
-
Public Key Cryptography and PGP
An overview of the basics of public key cryptosystems and one of the popular public key apps.
-
Snake Oil Warning Signs
Concise treatise on how to see the steak beyond the marketing sizzle.
-
Ugly Mistake for Pretty Good
A critical look at why "feature creep" puts PGP security at risk.
Technical Papers
-
Crypto & Security Tutorial of Peter Gutmann
Thorough and informative introduction to cryptography.
-
Cryptome at John Young's Archive
Current info on matters regarding cryptography, privacy & security.
-
Export Administration Regulations
U.S. government rules and regulations on the export of cryptography.
-
The Handbook of Applied Cryptography
The online edition of the book by the same name.
-
NIST Secure Hash Standard Page
A comprehensive listing of what a product must have to conform to NIST standards.
-
PGP4Pine: PGP implementation using Pine filters
How to utilize PGP v2.6.2 with Pine on various Unix platforms.
-
Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption
Essay on how key recovery and key escrow threaten crypto security.
(See also: Risks of Key Recovery, Key Escrow, and Third Party Encryption)
Writers welcomed! If you have a technical paper or article pertaining to
security tools and practices, please submit it.
|
|