Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

BLU Keysigning Party - FOLLOWUP - Links on Crypto History talk



Crypto talk URLs

Primary Sources -
http://www.w1tp.com/enigma Museum
http://en.wikipedia.org/wiki/Portal:Cryptography
http://en.wikipedia.org/wiki/Cryptography

---------------------------------

For more information / Further reading
http://en.wikipedia.org/wiki/Cryptography#Further_reading

Applied Cryptography by Bruce Schneier
A comprehensive tutorial and reference but a little light on
mathematical theory.
http://www.schneier.com/book-applied.html

Handbook of Applied Cryptography by A. J. Menezes, P. C. van Oorschot,
and S. A. Vanstone CRC Press, (PDF download available), somewhat more
mathematical than Schneier's Applied Cryptography.
http://www.cacr.math.uwaterloo.ca/hac/

Introduction to Modern Cryptography by Phillip Rogaway and Mihir
Bellare, a mathematical introduction to theoretical cryptography
including reduction-based security proofs.
PDFdownload. http://www.cs.ucdavis.edu/~rogaway/classes/227/spring05/book/main.pdf

Cryptonomicon by Neal Stephenson (novel, WW2 Enigma cryptanalysis
figures into the story, though not always realistically). The system
http://www.schneier.com/solitaire.html

A Cryptographic Compendium http://www.quadibloc.com/crypto/intro.htm

BP Bletchley Park, British National Museum of Cryptography & Computer
http://www.tnmoc.org/home.aspx

http://www.schneier.com/paper-self-study.html Self-Study Course in
Block Cipher Cryptanalysis

Matthew D. Russell (2004-02-27). "Tinyness: An Overview of TEA and
Related Ciphers". Archived from the original on 2007-08-12.
http://web.archive.org/web/20070812222155/http://www-users.cs.york.ac.uk/~matthew/TEA/.

Modes of Operation
http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation
Authenticated encryption modes: CCM | CWC | EAX
http://en.wikipedia.org/wiki/EAX_mode | GCM | OCB ;
http://en.wikipedia.org/wiki/Disk_encryption_theory






BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org