Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU |

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

*Subject*: BLU Keysigning Party - FOLLOWUP - Links on Crypto History talk*From*: bill.n1vux-Re5JQEeQqe8AvxtiuMwx3w at public.gmane.org (Bill Ricker)*Date*: Thu, 17 Sep 2009 20:36:40 -0400

Crypto talk URLs Primary Sources - http://www.w1tp.com/enigma Museum http://en.wikipedia.org/wiki/Portal:Cryptography http://en.wikipedia.org/wiki/Cryptography --------------------------------- For more information / Further reading http://en.wikipedia.org/wiki/Cryptography#Further_reading Applied Cryptography by Bruce Schneier A comprehensive tutorial and reference but a little light on mathematical theory. http://www.schneier.com/book-applied.html Handbook of Applied Cryptography by A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone CRC Press, (PDF download available), somewhat more mathematical than Schneier's Applied Cryptography. http://www.cacr.math.uwaterloo.ca/hac/ Introduction to Modern Cryptography by Phillip Rogaway and Mihir Bellare, a mathematical introduction to theoretical cryptography including reduction-based security proofs. PDFdownload. http://www.cs.ucdavis.edu/~rogaway/classes/227/spring05/book/main.pdf Cryptonomicon by Neal Stephenson (novel, WW2 Enigma cryptanalysis figures into the story, though not always realistically). The system http://www.schneier.com/solitaire.html A Cryptographic Compendium http://www.quadibloc.com/crypto/intro.htm BP Bletchley Park, British National Museum of Cryptography & Computer http://www.tnmoc.org/home.aspx http://www.schneier.com/paper-self-study.html Self-Study Course in Block Cipher Cryptanalysis Matthew D. Russell (2004-02-27). "Tinyness: An Overview of TEA and Related Ciphers". Archived from the original on 2007-08-12. http://web.archive.org/web/20070812222155/http://www-users.cs.york.ac.uk/~matthew/TEA/. Modes of Operation http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation Authenticated encryption modes: CCM | CWC | EAX http://en.wikipedia.org/wiki/EAX_mode | GCM | OCB ; http://en.wikipedia.org/wiki/Disk_encryption_theory

- Prev by Date:
**BLU Keysigning Party - FOLLOWUP - script to simplify signing and emailing keys** - Next by Date:
**BLU Keysigning Party - FOLLOWUP - Links on Crypto History talk** - Previous by thread:
**BLU Keysigning Party - FOLLOWUP - script to simplify signing and emailing keys - Using script with Gmail** - Next by thread:
**BLU Keysigning Party - FOLLOWUP - Links on Crypto History talk** - Index(es):

BLU is a member of BostonUserGroups | |

We also thank MIT for the use of their facilities. |

Boston Linux & Unix / webmaster@blu.org