CERIAS Hotlist
Page Content
- CERIAS: Center for Education and Research in Information Assurance and Security
The worlds foremost university center for multidisciplinary
research and education in areas of information security and information assurance.
http://www.cerias.purdue.edu/ - Added Dec 10, 1999
- Wired! story on
E-mail this article of cryptography to a friend!
http://www.wired.com/news/news/email/other/technology/story/... - Added Dec 10, 1999
- American Cryptogram Association
Links to ACA homepage, homepages of friends of the ACA, graphic files, etc...
http://www.und.nodak.edu/org/crypto/crypto/ - Added Dec 10, 1999
- Attrition
Get security and cryptography news here. Great computer attack analysis and some great graphs to stick in presentations for the suits.
http://www.attrition.org/ - Added Oct 24, 2000
- Center for Cryptography, Computer, and Network Security
The center's purpose is the andvancement of knowledge in the areas of cryptography, computer security, network security and
related areas from a theoretical as well as a practical viewpoint.
http://www.cs.uwm.edu/~cccns/ - Added Dec 10, 1999
- Center for Democracy and Technology
works to promote democratic values and constitutional liberties in the digital age. With expertise in law, technology, and policy, CDT seeks practical solutions to enhance free expression and privacy in global communications technologies.
http://www.cdt.org/crypto/ - Added Apr 10, 2001
- CERT Advisory CA-2000-18 PGP May Encrypt Data With Unauthorized ADKs
Data encrypted with PGP 5.5.x through 6.5.3 using a modified certificate will generate ciphertext encrypted with the ADK subject to
the conditions list in the impact section. The attacker who modified the certificate can o
http://www.cert.org/advisories/CA-2000-18.html - Added Sep 28, 2000
- Computer and Network Security, University of Tennessee
Information on course CS594 at the University of Tennessee.
http://www.cs.utk.edu/~dunigan/cs594-cns/ - Added Dec 10, 1999
- Computers Security and Industial Cryptography, Katholieke Universi
The goal of COSIC's research activities is to create an electronic equivalent for primitives in the physical
world such as confidentiality, signatures, identification, anonymity, notarization, and payments.
http://www.esat.kuleuven.ac.be/cosic/ - Added Dec 10, 1999
- Computers, Security, and Ethics Course
Explains how two professors (Keith Miller from UIS and Marsha Woodbury from UIUC) co-taught a course
called Computers, Security, and Ethics at the University of Illinois at Springfield and the University of Illinois at
Urbana-Champaign during the
http://www.cpsr.org/~marsha-w/twocampus.html - Added Dec 10, 1999
- Correlation Possibilities of the Bluetooth Combiner
In its intended usage the lengths of the key stream sequences produced by the Bluetooth stream cipher are strictly limited...
http://www.hut.fi/~mhermeli/julkaisut/icisc99s.ps.gz - Added Sep 28, 2000
- Crypt Newsletter
A news letter on different subjects relating to cryptography.
http://sun.soci.niu.edu/~crypt/ - Added Dec 10, 1999
- Cryptography and Internet Security, UMBC
Resources for course443 (Cryptography and Internet Security) offered at UMBC
http://www.cs.umbc.edu/~sherman/Courses/443/ - Added Dec 10, 1999
- Cryptography and Secure Communications, Purdue University
Resources and information on course EE627, Introduction to Cryptography and Secure Communication, offered at Purdue University.
http://dynamo.ecn.purdue.edu/~ace/courses/ee627/ee627.html - Added Dec 10, 1999
- Cryptography and Security Courses
List of crypto and security courses all over the world
http://avirubin.com/courses.html - Added Dec 10, 1999
- Cryptography, University of Illinois
Professor's notes from a past class taught on cryptography at the University of Illinois.
http://www.staff.uiuc.edu/~c-blair/crn.html - Added Dec 10, 1999
- Cryptography: The Study of Encryption
This article explains a little bit about cryptography and goes into the differences between symmetric and asymmetric cryptosystems.
http://world.std.com/~franl/crypto/cryptography.html - Added Dec 10, 1999
- Cryptologia
CRYPTOLOGIA is a unique scholarly journal devoted to all aspects of cryptology.
http://www.dean.usma.edu/math/resource/pubs/cryptolo/index.h... - Added Dec 10, 1999
- Cryptology in Computing, University of New Mexico
Course information on course Computer Science 431(Cryptology in Computing) offered at the University of New Mexico.
http://www.swcp.com/~mccurley/course/ - Added Dec 10, 1999
- Cryptology, Odense University (Denmark)
Information on a course in cryptology taught at Odense University in Denmark.
http://www.imada.sdu.dk/~joan/crypt/ - Added Dec 10, 1999
- Data Encryption Techniques
An article on encrypting data and different techniques to do so.
http://catalog.com/sft/encrypt.html - Added Dec 10, 1999
- Data Security and Cryptography, Oregon State University
Resources and information for course ECE 575 (Data Security and Cryptography) offered at Oregon State University
http://security.ece.orst.edu/koc/ece575/ - Added Dec 10, 1999
- Delegation and Agreement Based Certification Policy
In this article I discuss trust, delegation, and policy issues related to the Simple Public Key Infrastructure, Matt Blaze\'s
PolicyMaker, and PGP\'s Web of Trust. Some understanding of SPKI by the reader is assumed.
http://szabo.best.vwh.net/trust.html - Added Dec 10, 1999
- Design and Analysis of Cryptographic Protocols, NYU
Resources for Design and Analysis of Cryptographic Protocols. A course offered at NYU.
http://cs.nyu.edu/cs/dept_info/course_home_pages/fall96/G22.... - Added Dec 10, 1999
- Document & Email Digital Rights Management
Secure your email & attachments from unauthorized
use. Protect your data and information and prevent forwarding, copying,
printing and more.
http://www.essentialsecurity.com/ - Added Aug 05, 2006
- Duke University Department of Computer Science
Duke's Department of Computer Science home page.
http://www.cs.duke.edu/ - Added Dec 10, 1999
- EFF "Privacy, Security, Crypto, & Surveillance" Archive
No Description Available
http://www.eff.org/Privacy/ - Added Dec 10, 1999
- Enigma Applet
An applet that simulates a WWII German Enigma encryption machine.
http://russells.freeshell.org/enigma/ - Added Aug 15, 2005
- EPIC's page
Recent Crypto News and Documents.
http://epic.org/crypto/ - Added Dec 10, 1999
- Information Systems Security Laboratory, ECE Iowa State University (ISSL)
A site providing information on courses offered in Information Systems Security at Iowa State University.
http://www.issl.org/ - Added Dec 10, 1999
- International Association for Cryptologic Research
The International Association for Cryptologic Research (IACR) is a non-profit scientific
organization whose purpose is to further research in cryptology and related fields.
http://www.iacr.org/ - Added Dec 10, 1999
- Interview with Phil Zimmermann
The following is a full transcript of a radio show broadcast on radio station WALE. The views expressed are solely those of Russell
D. Hoffman and Phil Zimmermann (creator of PGP) and do not necessarily reflect anyone else's point of view.
http://www.animatedsoftware.com/hightech/philspgp.htm - Added Dec 10, 1999
- Key-Experiments: How PGP Deals with Manipulated Keys
Different versions of PGP show considerably different reactions when being confronted with public keys which
have been subsequently manipulated. This study helps to understand this threat, to find out experimentally how a specific version
http://senderek.de/security/key-experiments.html - Added Sep 28, 2000
- MISTY1 from Matsui and Ohta
This document describes a secret-key cryptosystem MISTY1, which is
block cipher with a 128-bit key, a 64-bit block and a variable number
of rounds.
http://www.scramdisk.clara.net/other/draft-ohta-misty1desc-0... - Added Dec 10, 1999
- Network Security, Georgia Tech
Course Information on CS8113e (Network Security) offered at Georgia Tech.
http://www.cc.gatech.edu/classes/cs8113e_96_winter/ - Added Dec 10, 1999
- North American Cryptography Archives
An archive of cryptographic software available to US citizens only.
http://www.cryptography.org/ - Added Oct 05, 2000
- NRC report: Cryptography's Role in Securing the Information Society
When used in conjunction with other approaches to
information security, cryptography is a very powerful tool
for protecting information.
http://www.nap.edu/readingroom/books/crisis/ - Added Dec 10, 1999
- PGP ADK Security Advisory
This page provides the most up-to-date information regarding this issue
and what steps Network Associates is taking. Please refer back to this page in the future for updates.
http://www.pgp.com/support/product-advisories/adk.asp - Added Sep 28, 2000
- PGP Vulnerablility
A very serious PGP vulnerability was just discovered. Using this
vulnerability, an attacker can create a modified version of someone\
http://slashdot.org/articles/00/08/24/155214.shtml - Added Sep 28, 2000
- Public-Key Intrastructure
Information on the Public-Key Infrastructure
http://www.ietf.org/html.charters/pkix-charter.html - Added Apr 10, 2001
- Quadralay Cryptography Archive
A collection of links that lead to information, articles, products, etc. on cryptography.
http://www.austinlinks.com/Crypto/ - Added Dec 10, 1999
- RC6, from Dr. Ron Rivest
This site contains links to numerous publications by Ronald L. Rivest about security, cryptography, etc.
http://theory.lcs.mit.edu/~rivest/publications.html - Added Dec 10, 1999
- Ross Anderson's homepage
Information on his work in a variety of fields mainly in Information security and assurance.
http://www.cl.cam.ac.uk:80/users/rja14/ - Added Dec 10, 1999
- Secure Sockets Layer
Good techical and practical information on Secure Sockets Layer (SSL)
http://wp.netscape.com/security/techbriefs/ssl.html - Added Apr 10, 2001
- Security Courses, University of Wisconsin
A link to three different security courses taught by Yvo G. Desmedt at the University of Wisconsin. These courses are Data Security, Internet and Network Security/Insecurity, and Advanced Cryptography.
http://www.cs.uwm.edu/faculty/desmedt/teaching.html - Added Dec 10, 1999
- Security Forums Dot Com :: Share Your Knowledge
Discussion on topics such as computer security, networking and operating systems. Also general topics and an area for sharing humourous findings.
http://www.security-forums.com - Added Jul 07, 2003
- Software Generation of Practically Strong Random Numbers
My research interests cover the design and analysis of security techniques and systems, with a sideline in various obscure
security-related areas such as the recovery of deleted data from magnetic media, and whatever else happens to catch my
intere
http://www.cs.auckland.ac.nz/~pgut001/ - Added Dec 10, 1999
- The Prehistory of Public Key Cryptography
In the open literature, Diffie, Hellman, and Merkle are credited with being the inventors of public key cryptography. But there is
evidence that assorted intelligence agencies knew of the technique years earlier. (Some discussion of this question ca
http://www.research.att.com/~smb/nsam-160/ - Added Dec 10, 1999
- The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption
This report examines the fundamental properties of these requirements
and attempts to outline the technical risks, costs, and implications of deploying systems
that provide government access to encryption keys.
http://www.cdt.org/crypto/risks98/ - Added Dec 10, 1999
- UMBC Cryptography Course
Resources for CMSC-691g (Internet Security) offered at UMBC
http://www.cs.umbc.edu/~sherman/Courses/691g/index.html - Added Dec 10, 1999