CERIAS Hotlist
Page Content
- Wired! story on
E-mail this article of cryptography to a friend!
http://www.wired.com/news/news/email/other/technology/story/... - Added Dec 10, 1999
- Alec Muffett's homepage
Alec Muffett's homepage which links to software he has written including Crack.
http://www.users.dircon.co.uk/~crypto/ - Added Dec 10, 1999
- Algorithmic Research
AR, subsidary of Cylink, develops and markets a comprehensive family of security solutions.
http://www.arx.com/ - Added Dec 10, 1999
- American Cryptogram Association
Links to ACA homepage, homepages of friends of the ACA, graphic files, etc...
http://www.und.nodak.edu/org/crypto/crypto/ - Added Dec 10, 1999
- Attrition
Get security and cryptography news here. Great computer attack analysis and some great graphs to stick in presentations for the suits.
http://www.attrition.org/ - Added Oct 24, 2000
- Center for Cryptography, Computer, and Network Security
The center's purpose is the andvancement of knowledge in the areas of cryptography, computer security, network security and
related areas from a theoretical as well as a practical viewpoint.
http://www.cs.uwm.edu/~cccns/ - Added Dec 10, 1999
- Center for Democracy and Technology
works to promote democratic values and constitutional liberties in the digital age. With expertise in law, technology, and policy, CDT seeks practical solutions to enhance free expression and privacy in global communications technologies.
http://www.cdt.org/crypto/ - Added Apr 10, 2001
- Centre for Applied Internet Research
The Centre for Applied Internet Research (CAIR) pages at University of Wales, NEWI, Wrexham. These pages provide information for current and potential academic and industrial partners as well as staff who are research active within the group, or who may be interested in following research initiatives.
http://www.newi.ac.uk/computing/cair - Added Sep 25, 2004
- Clipper Chip
The Clipper Chip is a cryptographic device being promoted by the U.S. government. Its purported advantage is that it provides a
standard for securing private voice communication.
http://www.cpsr.org/program/clipper/clipper.html - Added Dec 10, 1999
- Coded Drag
CodedDrag encrypts your personal data using strong encryption algorithms like Triple DES and Blowfish. It was developed as an
example tool to demonstrate the new possibilities of the Windows 95 / NT 4.0 shell.
http://www.fim.uni-linz.ac.at/codeddrag/codedrag.htm - Added Dec 10, 1999
- Correlation Possibilities of the Bluetooth Combiner
In its intended usage the lengths of the key stream sequences produced by the Bluetooth stream cipher are strictly limited...
http://www.hut.fi/~mhermeli/julkaisut/icisc99s.ps.gz - Added Sep 28, 2000
- Counterpage Systems, Computer Security and Cryptography Consulting
Provides a full range of dynamic Managed Security Monitoring services taht enable safe e-business.
http://www.counterpane.com/ - Added Dec 10, 1999
- Crypt Newsletter
A news letter on different subjects relating to cryptography.
http://sun.soci.niu.edu/~crypt/ - Added Dec 10, 1999
- Crypto++ 4.1 - a C++ Class Library of Cryptographic Primitives
Crypto++ is a free C++ class library of cryptographic schemes. Currently the library consists of the following, some of which is
other people's code, repackaged into classes.
http://www.eskimo.com/~weidai/cryptlib.html - Added Dec 10, 1999
- Cryptography Management Kit
Resources for cryptography, including guidebook, presentation, an FAQ, an audit kit and a source library comprising 3DES, RSA, MD5 and SHA-1.
http://www.cryptography-tutorial.com - Added Jun 11, 2003
- Cryptography: The Study of Encryption
This article explains a little bit about cryptography and goes into the differences between symmetric and asymmetric cryptosystems.
http://world.std.com/~franl/crypto/cryptography.html - Added Dec 10, 1999
- CryptoHeaven
CryptoHeaven is a secure Internet communications service comprised of the following: Secure Email, Secure Online Storage, File Sharing and File Distribution, Secure Instant Messaging and Chatting and Secure and Private Discussion Forums
http://www.cryptoheaven.com - Added Jan 05, 2003
- Cryptologia
CRYPTOLOGIA is a unique scholarly journal devoted to all aspects of cryptology.
http://www.dean.usma.edu/math/resource/pubs/cryptolo/index.h... - Added Dec 10, 1999
- Cypherpunks' Homepage
Here you can find links to PGP, remailers, rants, various crypto-tools,
newspaper clippings, and a good deal of other things.
http://www.csua.berkeley.edu/cypherpunks/Home.html - Added Dec 10, 1999
- Data Encryption Techniques
An article on encrypting data and different techniques to do so.
http://catalog.com/sft/encrypt.html - Added Dec 10, 1999
- Delegation and Agreement Based Certification Policy
In this article I discuss trust, delegation, and policy issues related to the Simple Public Key Infrastructure, Matt Blaze\'s
PolicyMaker, and PGP\'s Web of Trust. Some understanding of SPKI by the reader is assumed.
http://szabo.best.vwh.net/trust.html - Added Dec 10, 1999
- Differential Power Analysis: a smartcard attack
Differential Power Analysis (DPA) is a new class of attacks discovered by researchers at
Cryptography Research in San Francisco. DPA affects the security of smart cards and other
http://www.cryptography.com/resources/whitepapers/DPA.html - Added Dec 10, 1999
- envelope
Protect your email privacy! Envelope v1.0 encrypts your email messages so that
only the intended recipient can read them. Without encryption your email messages
are sent over the Internet like postcards which can be read
http://www.mtt.com/envelope/ - Added Dec 10, 1999
- EPIC's page
Recent Crypto News and Documents.
http://epic.org/crypto/ - Added Dec 10, 1999
- FIPS, Government Encryption Standards
The Federal Information Processing Standards information on Security Requirements for Cryptographic Modules.
http://csrc.nist.gov/publications/fips/index.html - Added Dec 10, 1999
- Fortify for Netscape (128 bit encryption)
A program that provides world-wide, unconditional, full-strength 128-bit cryptography to users of Netscape Navigator (v3 and v4) and Communicator (v4).
http://www.fortify.net/ - Added Dec 10, 1999
- GemiScorp Software Solutions
Provides innovative and quality software solutions for home and corporate users demanding reliable, user friendly and well-supported security and productivity products. Home of award-winning programs like SafeLogon, SafeSystem, SafeCryptor and LaunchIt NOW! Plus.
http://www.gemiscorp.com - Added Jun 05, 2003
- Meganet: Secure Information is Power
Maganet offers products to secure your documents and computer. Check out their powerful, transparent data security solution.
http://www.meganet.com/ - Added Dec 10, 1999
- MISTY1 from Matsui and Ohta
This document describes a secret-key cryptosystem MISTY1, which is
block cipher with a 128-bit key, a 64-bit block and a variable number
of rounds.
http://www.scramdisk.clara.net/other/draft-ohta-misty1desc-0... - Added Dec 10, 1999
- nCipher Corporation
The leading developer of high-performance hardware security products specifically designed for e-commerce and Public Key Infrastructure applications.
http://www.ncipher.com/ - Added Dec 10, 1999
- New Crypto Technique from NEC
NEC said Wednesday that it will release details early next year
about a new encryption technology it claims could offer an
alternative to the U.S. Data Encryption Standard (DES).
http://content.techweb.com/wire/news/1997/10/1023crypto.html - Added Dec 10, 1999
- North American Cryptography Archives
An archive of cryptographic software available to US citizens only.
http://www.cryptography.org/ - Added Oct 05, 2000
- Public-Key Cryptography Standards
The Public-Key Cryptography Standards are specifications produced
by RSA Laboratories in cooperation with secure systems developers
worldwide for the purpose of accelerating the deployment of
http://www.rsasecurity.com/rsalabs/pkcs/ - Added Dec 10, 1999
- Public-Key Intrastructure
Information on the Public-Key Infrastructure
http://www.ietf.org/html.charters/pkix-charter.html - Added Apr 10, 2001
- Quadralay Cryptography Archive
A collection of links that lead to information, articles, products, etc. on cryptography.
http://www.austinlinks.com/Crypto/ - Added Dec 10, 1999
- RC6, from Dr. Ron Rivest
This site contains links to numerous publications by Ronald L. Rivest about security, cryptography, etc.
http://theory.lcs.mit.edu/~rivest/publications.html - Added Dec 10, 1999
- Ronald L. Rivest's Cryptography and Security
This page contains pointers to other web pages dealing with cryptography and security.
http://theory.lcs.mit.edu/~rivest/crypto-security.html - Added Dec 10, 1999
- Ross Anderson's homepage
Information on his work in a variety of fields mainly in Information security and assurance.
http://www.cl.cam.ac.uk:80/users/rja14/ - Added Dec 10, 1999
- RSA Cryptography FAQ
RSA Laboratories' Frequently Asked Questions
About Today's Cryptography, Version 4.1
http://www.rsasecurity.com/rsalabs/faq/ - Added Dec 10, 1999
- RSA's Security Homepage
RSA Security's homepage. Links to security articles and product.
http://www.rsasecurity.com/ - Added Dec 10, 1999
- S/MIME Mail Security (smime) Charter
The S/MIME Working Group has completed five Proposed Standards that comprise the S/MIME version 3 specification. Current
efforts build on these base specifications.
http://www.ietf.org/html.charters/smime-charter.html - Added Dec 10, 1999
- Safezone Email Security - Secure Email Assurance
Secure document exchange and email security using secure warehouse technology. Safezone email security.
http://www.email-security-secure-email.co.uk - Added Feb 26, 2002
- Secure Sockets Layer
Good techical and practical information on Secure Sockets Layer (SSL)
http://wp.netscape.com/security/techbriefs/ssl.html - Added Apr 10, 2001
- Security Research at IBM Watson
http://www.research.ibm.com/security/ - Added Dec 10, 1999
- SkeyCalc - OTP responses for MacOS X and MacOS X Server
SkeyCalc computes One-Time Passwords for use in logging in (or otherwise authenticating to) servers which implement S/Key or OTP access control. SkeyCalc is compliant with RFC-2289.
http://www.orange-carb.org/SkeyCalc/ - Added Mar 28, 2001
- SOFTWAR EXCLUSIVE INTERVIEW WITH FORMER NSA DIRECTOR
ADMIRAL MCCONNELL
Admiral
McConnell later became Director of the National Security Agency (NSA) after the Gulf victory and served under both
President Bush and President Clinton. Admiral McConnell finally retired from service in 1996 and left the NSA. Today, he
wor
http://www.softwar.net/mcc.html - Added Dec 10, 1999
- Software Generation of Practically Strong Random Numbers
My research interests cover the design and analysis of security techniques and systems, with a sideline in various obscure
security-related areas such as the recovery of deleted data from magnetic media, and whatever else happens to catch my
intere
http://www.cs.auckland.ac.nz/~pgut001/ - Added Dec 10, 1999
- Software Piracy Solutions & Antipiracy Software
Antipiracy World: Where to find Software Piracy Solutions & Anti-Piracy Software.
http://www.antipiracyworld.com/ - Added Jan 27, 2001
- Systemics Cryptix crypto library for Perl
http://www.cryptix.org/ - Added Dec 10, 1999
- TEA, a Tiny Encryption Algorithm.
We design a short program which will run on most machines and encypher safely. It uses a large number of iterations rather than
a complicated program. It is hoped that it can easily be translated into most languages in a compatible way.
http://www.ftp.cl.cam.ac.uk/ftp/papers/djw-rmn/djw-rmn-tea.h... - Added Dec 10, 1999
- Teledyne Security Information
http://www.infsec.com/ - Added Jun 18, 2003
- The hash function RIPEMD-160
RIPEMD-160 is a 160-bit cryptographic hash function, designed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel.
http://www.esat.kuleuven.ac.be/%7ebosselae/ripemd160.html - Added Dec 10, 1999
- The PKI page
Comprehensive list of PKI links,
esp. links to certification authorities
http://www.pki-page.org/ - Added Jul 25, 2000
- The Prehistory of Public Key Cryptography
In the open literature, Diffie, Hellman, and Merkle are credited with being the inventors of public key cryptography. But there is
evidence that assorted intelligence agencies knew of the technique years earlier. (Some discussion of this question ca
http://www.research.att.com/~smb/nsam-160/ - Added Dec 10, 1999
- Venona - Soviet Espionage and The American Response 1939-1957
http://www.odci.gov/csi/books/venona/venona.htm - Added Jun 25, 2001
- Welcome to CRYPTOGRAPHY.COM
Advancing academic research and providing industry-leading commercial services in cryptography and data security.
http://www.cryptography.com/ - Added Dec 10, 1999