update lists
This commit is contained in:
@@ -1,4 +1,4 @@
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Crypto Papers [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://raw.githubusercontent.com/sindresorhus/awesome/d2005375894e77d69827b0e3c17073bbf6f062d7/media/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://github.com/sindresorhus/awesome)[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Crypto Papers [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://raw.githubusercontent.com/sindresorhus/awesome/d2005375894e77d69827b0e3c17073bbf6f062d7/media/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://github.com/sindresorhus/awesome)[0m
|
||||
|
||||
[38;5;12mA curated list of [39m[38;5;14m[1mcryptography[0m[38;5;12m (https://en.wikipedia.org/wiki/Cryptography) papers, articles, tutorials and howtos for non-cryptographers.[39m
|
||||
|
||||
@@ -8,12 +8,12 @@
|
||||
|
||||
[38;2;255;187;0m[4mNotes [0m
|
||||
|
||||
[38;5;12mThe[39m[38;5;12m [39m[38;5;12mgoal[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthis[39m[38;5;12m [39m[38;5;12mlist[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mprovide[39m[38;5;12m [39m[38;5;12meducational[39m[38;5;12m [39m[38;5;12mreading[39m[38;5;12m [39m[38;5;12mmaterial[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mdifferent[39m[38;5;12m [39m[38;5;12mlevels[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mcryptographic[39m[38;5;12m [39m[38;5;12mknowledge.[39m[38;5;12m [39m[38;5;12mI[39m[38;5;12m [39m[38;5;12mstarted[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mbecause[39m[38;5;12m [39m[38;5;12mmy[39m[38;5;12m [39m[38;5;12mday[39m[38;5;12m [39m[38;5;12mjob[39m[38;5;12m [39m[38;5;12monboarding[39m[38;5;12m [39m[38;5;12mengineers[39m[38;5;12m [39m[38;5;12mat[39m[38;5;12m [39m[38;5;14m[1mCossack[0m[38;5;14m[1m [0m[38;5;14m[1mLabs[0m[38;5;12m [39m[38;5;12m(https://www.cossacklabs.com)[39m[38;5;12m [39m[38;5;12mincludes[39m[38;5;12m [39m[38;5;12meducating[39m[38;5;12m [39m[38;5;12mthem[39m
|
||||
[38;5;12min[39m[38;5;12m [39m[38;5;12mcryptographic[39m[38;5;12m [39m[38;5;12mmatters[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mgiving[39m[38;5;12m [39m[38;5;12madvise[39m[38;5;12m [39m[38;5;12mwhat[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mread[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mspecific[39m[38;5;12m [39m[38;5;12mtopics,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12minvolves[39m[38;5;12m [39m[38;5;12mfinding[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12msame[39m[38;5;12m [39m[38;5;12mmaterials[39m[38;5;12m [39m[38;5;12mrepeatedly.[39m[38;5;12m [39m[38;5;12mHopefully,[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mwill[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12museful[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12msomeone[39m[38;5;12m [39m[38;5;12melse[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mwell.[39m[38;5;12m [39m
|
||||
[38;5;12mThe[39m[38;5;12m [39m[38;5;12mgoal[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthis[39m[38;5;12m [39m[38;5;12mlist[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mprovide[39m[38;5;12m [39m[38;5;12meducational[39m[38;5;12m [39m[38;5;12mreading[39m[38;5;12m [39m[38;5;12mmaterial[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mdifferent[39m[38;5;12m [39m[38;5;12mlevels[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mcryptographic[39m[38;5;12m [39m[38;5;12mknowledge.[39m[38;5;12m [39m[38;5;12mI[39m[38;5;12m [39m[38;5;12mstarted[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mbecause[39m[38;5;12m [39m[38;5;12mmy[39m[38;5;12m [39m[38;5;12mday[39m[38;5;12m [39m[38;5;12mjob[39m[38;5;12m [39m[38;5;12monboarding[39m[38;5;12m [39m[38;5;12mengineers[39m[38;5;12m [39m[38;5;12mat[39m[38;5;12m [39m[38;5;14m[1mCossack[0m[38;5;14m[1m [0m[38;5;14m[1mLabs[0m[38;5;12m [39m[38;5;12m(https://www.cossacklabs.com)[39m[38;5;12m [39m[38;5;12mincludes[39m[38;5;12m [39m[38;5;12meducating[39m[38;5;12m [39m[38;5;12mthem[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m
|
||||
[38;5;12mcryptographic[39m[38;5;12m [39m[38;5;12mmatters[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mgiving[39m[38;5;12m [39m[38;5;12madvise[39m[38;5;12m [39m[38;5;12mwhat[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mread[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mspecific[39m[38;5;12m [39m[38;5;12mtopics,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12minvolves[39m[38;5;12m [39m[38;5;12mfinding[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12msame[39m[38;5;12m [39m[38;5;12mmaterials[39m[38;5;12m [39m[38;5;12mrepeatedly.[39m[38;5;12m [39m[38;5;12mHopefully,[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mwill[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12museful[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12msomeone[39m[38;5;12m [39m[38;5;12melse[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mwell.[39m[38;5;12m [39m
|
||||
|
||||
[38;5;12mIt[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12maimed[39m[38;5;12m [39m[38;5;12mat[39m[38;5;12m [39m[38;5;12mpeople[39m[38;5;12m [39m[38;5;12mwho[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12musing[39m[38;5;12m [39m[38;5;12mcryptography[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mhigher-level[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12msystems[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mimplement[39m[38;5;12m [39m[38;5;12mdatabase[39m[38;5;12m [39m[38;5;12mencryption,[39m[38;5;12m [39m[38;5;12msecure[39m[38;5;12m [39m[38;5;12msharing,[39m[38;5;12m [39m[38;5;12mend-to-end[39m[38;5;12m [39m[38;5;12mencryption[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mvarious[39m[38;5;12m [39m[38;5;12mschemes,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mshould[39m[38;5;12m [39m[38;5;12munderstand[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mworks,[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mfails[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mis[39m
|
||||
[38;5;12mattacked.[39m[38;5;12m [39m[38;5;12mIt[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mnot[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mlist[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mnotable[39m[38;5;12m [39m[38;5;12m/[39m[38;5;12m [39m[38;5;12mimportant[39m[38;5;12m [39m[38;5;12m/[39m[38;5;12m [39m[38;5;12mhistorically[39m[38;5;12m [39m[38;5;12mimportant[39m[38;5;12m [39m[38;5;12mpapers[39m[38;5;12m [39m[38;5;12m(although[39m[38;5;12m [39m[38;5;12mmany[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthem[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mhere).[39m[38;5;12m [39m[38;5;12mIt[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mnot[39m[38;5;12m [39m[38;5;12maimed[39m[38;5;12m [39m[38;5;12mat[39m[38;5;12m [39m[38;5;12macademics[39m[38;5;12m [39m[38;5;12m(who[39m[38;5;12m [39m[38;5;12mhave[39m[38;5;12m [39m[38;5;12mbetter[39m[38;5;12m [39m[38;5;12mgrasp[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mwhat[39m[38;5;12m [39m[38;5;12mthey[39m[38;5;12m [39m[38;5;12mneed[39m[38;5;12m [39m[38;5;12manyway),[39m[38;5;12m [39m[38;5;12mnor[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12maimed[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12msystematic[39m[38;5;12m [39m[38;5;12mstudy[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m
|
||||
[38;5;12mwanna-be[39m[38;5;12m [39m[38;5;12mcryptographers[39m[38;5;12m [39m[38;5;12m(who[39m[38;5;12m [39m[38;5;12mbetter[39m[38;5;12m [39m[38;5;12mfollow[39m[38;5;12m [39m[38;5;12mstructured[39m[38;5;12m [39m[38;5;12mapproach[39m[38;5;12m [39m[38;5;12munder[39m[38;5;12m [39m[38;5;12mprofessional[39m[38;5;12m [39m[38;5;12mguidance).[39m[38;5;12m [39m
|
||||
[38;5;12mIt[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12maimed[39m[38;5;12m [39m[38;5;12mat[39m[38;5;12m [39m[38;5;12mpeople[39m[38;5;12m [39m[38;5;12mwho[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12musing[39m[38;5;12m [39m[38;5;12mcryptography[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mhigher-level[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12msystems[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mimplement[39m[38;5;12m [39m[38;5;12mdatabase[39m[38;5;12m [39m[38;5;12mencryption,[39m[38;5;12m [39m[38;5;12msecure[39m[38;5;12m [39m[38;5;12msharing,[39m[38;5;12m [39m[38;5;12mend-to-end[39m[38;5;12m [39m[38;5;12mencryption[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mvarious[39m[38;5;12m [39m[38;5;12mschemes,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mshould[39m[38;5;12m [39m[38;5;12munderstand[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mworks,[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mfails[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mattacked.[39m
|
||||
[38;5;12mIt[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mnot[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mlist[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mnotable[39m[38;5;12m [39m[38;5;12m/[39m[38;5;12m [39m[38;5;12mimportant[39m[38;5;12m [39m[38;5;12m/[39m[38;5;12m [39m[38;5;12mhistorically[39m[38;5;12m [39m[38;5;12mimportant[39m[38;5;12m [39m[38;5;12mpapers[39m[38;5;12m [39m[38;5;12m(although[39m[38;5;12m [39m[38;5;12mmany[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthem[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mhere).[39m[38;5;12m [39m[38;5;12mIt[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mnot[39m[38;5;12m [39m[38;5;12maimed[39m[38;5;12m [39m[38;5;12mat[39m[38;5;12m [39m[38;5;12macademics[39m[38;5;12m [39m[38;5;12m(who[39m[38;5;12m [39m[38;5;12mhave[39m[38;5;12m [39m[38;5;12mbetter[39m[38;5;12m [39m[38;5;12mgrasp[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mwhat[39m[38;5;12m [39m[38;5;12mthey[39m[38;5;12m [39m[38;5;12mneed[39m[38;5;12m [39m[38;5;12manyway),[39m[38;5;12m [39m[38;5;12mnor[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12maimed[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12msystematic[39m[38;5;12m [39m[38;5;12mstudy[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mwanna-be[39m[38;5;12m [39m
|
||||
[38;5;12mcryptographers[39m[38;5;12m [39m[38;5;12m(who[39m[38;5;12m [39m[38;5;12mbetter[39m[38;5;12m [39m[38;5;12mfollow[39m[38;5;12m [39m[38;5;12mstructured[39m[38;5;12m [39m[38;5;12mapproach[39m[38;5;12m [39m[38;5;12munder[39m[38;5;12m [39m[38;5;12mprofessional[39m[38;5;12m [39m[38;5;12mguidance).[39m[38;5;12m [39m
|
||||
|
||||
[38;5;12mIt will be extended gradually as I find something of "must-have" value. Pull requests are very welcome.[39m
|
||||
|
||||
@@ -53,8 +53,8 @@
|
||||
[38;2;255;187;0m[4mGeneral cryptographic interest[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAnother Look at “Provable Security”[0m[38;5;12m (https://eprint.iacr.org/2004/152.pdf) - Inquiries into formalism and naive intuition behind security proofs, by Neal Koblitz et al.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe[0m[38;5;14m[1m [0m[38;5;14m[1msecurity[0m[38;5;14m[1m [0m[38;5;14m[1mimpact[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1ma[0m[38;5;14m[1m [0m[38;5;14m[1mnew[0m[38;5;14m[1m [0m[38;5;14m[1mcryptographic[0m[38;5;14m[1m [0m[38;5;14m[1mlibrary[0m[38;5;12m [39m[38;5;12m(https://cryptojedi.org/papers/coolnacl-20120725.pdf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mIntroductory[39m[38;5;12m [39m[38;5;12mpaper[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mNaCl,[39m[38;5;12m [39m[38;5;12mdiscussing[39m[38;5;12m [39m[38;5;12mimportant[39m[38;5;12m [39m[38;5;12maspects[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mimplementing[39m[38;5;12m [39m[38;5;12mcryptography[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12musing[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mlarger[39m[38;5;12m [39m[38;5;12mbuilding[39m[38;5;12m [39m[38;5;12mblock[39m[38;5;12m [39m
|
||||
[38;5;12min[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12msystems,[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mDaniel[39m[38;5;12m [39m[38;5;12mJ.[39m[38;5;12m [39m[38;5;12mBernstein,[39m[38;5;12m [39m[38;5;12mTanja[39m[38;5;12m [39m[38;5;12mLange,[39m[38;5;12m [39m[38;5;12mPeter[39m[38;5;12m [39m[38;5;12mSchwabe.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe[0m[38;5;14m[1m [0m[38;5;14m[1msecurity[0m[38;5;14m[1m [0m[38;5;14m[1mimpact[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1ma[0m[38;5;14m[1m [0m[38;5;14m[1mnew[0m[38;5;14m[1m [0m[38;5;14m[1mcryptographic[0m[38;5;14m[1m [0m[38;5;14m[1mlibrary[0m[38;5;12m [39m[38;5;12m(https://cryptojedi.org/papers/coolnacl-20120725.pdf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mIntroductory[39m[38;5;12m [39m[38;5;12mpaper[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mNaCl,[39m[38;5;12m [39m[38;5;12mdiscussing[39m[38;5;12m [39m[38;5;12mimportant[39m[38;5;12m [39m[38;5;12maspects[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mimplementing[39m[38;5;12m [39m[38;5;12mcryptography[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12musing[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mlarger[39m[38;5;12m [39m[38;5;12mbuilding[39m[38;5;12m [39m[38;5;12mblock[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12msecurity[39m
|
||||
[38;5;12msystems,[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mDaniel[39m[38;5;12m [39m[38;5;12mJ.[39m[38;5;12m [39m[38;5;12mBernstein,[39m[38;5;12m [39m[38;5;12mTanja[39m[38;5;12m [39m[38;5;12mLange,[39m[38;5;12m [39m[38;5;12mPeter[39m[38;5;12m [39m[38;5;12mSchwabe.[39m
|
||||
|
||||
|
||||
|
||||
@@ -80,27 +80,25 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSalsa20 family of stream ciphers[0m[38;5;12m (https://cr.yp.to/snuffle/salsafamily-20071225.pdf) - Broad explanation of Salsa20 security cipher by Daniel J. Bernstein.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNew Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba[0m[38;5;12m (https://eprint.iacr.org/2007/472.pdf) - Analysis of Salsa20 family of ciphers, by Jean-Philippe Aumasson et al.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS)[0m[38;5;12m (https://tools.ietf.org/html/draft-ietf-tls-chacha20-poly1305-04) - IETF Draft of ciphersuite family, by Adam Langley et al.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAES submission document on Rijndael[0m
|
||||
[38;5;12m (https://csrc.nist.gov/csrc/media/projects/cryptographic-standards-and-guidelines/documents/aes-development/rijndael-ammended.pdf#page=1) - Original Rijndael proposal by Joan Daemen and Vincent Rijmen.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAES submission document on Rijndael[0m[38;5;12m (https://csrc.nist.gov/csrc/media/projects/cryptographic-standards-and-guidelines/documents/aes-development/rijndael-ammended.pdf#page=1) - Original Rijndael proposal by Joan Daemen and Vincent Rijmen.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOngoing Research Areas in Symmetric Cryptography[0m
|
||||
[38;5;12m (https://web.archive.org/web/20220209130448/https://www.ecrypt.eu.org/ecrypt1/documents/D.STVL.3-2.5.pdf) - Overview of ongoing research in secret key crypto and hashes by ECRYPT Network of Excellence in Cryptology.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe Galois/Counter Mode of Operation (GCM)[0m
|
||||
[38;5;12m (https://web.archive.org/web/20221007191258/https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.694.695&rep=rep1&type=pdf) - Original paper introducing GCM, by by David A. McGrew and John Viega.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe Galois/Counter Mode of Operation (GCM)[0m[38;5;12m (https://web.archive.org/web/20221007191258/https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.694.695&rep=rep1&type=pdf) - Original paper introducing GCM, by by David A. McGrew and John Viega.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe Security and Performance of the Galois/Counter Mode (GCM) of Operation[0m[38;5;12m (https://eprint.iacr.org/2004/193.pdf) - Design, analysis and security of GCM, and, more specifically, AES GCM mode, by David A. McGrew and John Viega.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGCM Security Bounds Reconsidered[0m
|
||||
[38;5;12m (https://www.iacr.org/archive/fse2015/85400168/85400168.pdf) - An analysis and algorithm for nonce generation for AES GCM with higher counter-collision probability, by Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mProxy-Mediated Searchable Encryption in SQL Databases Using Blind Indexes[0m
|
||||
[38;5;12m (https://eprint.iacr.org/2019/806.pdf) - An overview of existing searchable encryption schemes, and analysis of scheme built on AES-GCM, blind index and bloom filter by Eugene Pilyankevich, Dmytro Kornieiev, Artem Storozhuk.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDES[0m[38;5;14m[1m [0m[38;5;14m[1mis[0m[38;5;14m[1m [0m[38;5;14m[1mnot[0m[38;5;14m[1m [0m[38;5;14m[1ma[0m[38;5;14m[1m [0m[38;5;14m[1mgroup[0m[38;5;12m [39m[38;5;12m(https://link.springer.com/content/pdf/10.1007/3-540-48071-4_36.pdf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mOld[39m[38;5;12m [39m[38;5;12mbut[39m[38;5;12m [39m[38;5;12mgold[39m[38;5;12m [39m[38;5;12mmathematical[39m[38;5;12m [39m[38;5;12mproof[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mset[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mDES[39m[38;5;12m [39m[38;5;12mpermutations[39m[38;5;12m [39m[38;5;12m(encryption[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mdecryption[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12meach[39m[38;5;12m [39m[38;5;12mDES[39m[38;5;12m [39m[38;5;12mkey)[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mnot[39m[38;5;12m [39m[38;5;12mclosed[39m[38;5;12m [39m[38;5;12munder[39m[38;5;12m [39m[38;5;12mfunctional[39m[38;5;12m [39m
|
||||
[38;5;12mcomposition.[39m[38;5;12m [39m[38;5;12mThat[39m[38;5;12m [39m[38;5;12mmeans[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mmultiple[39m[38;5;12m [39m[38;5;12mDES[39m[38;5;12m [39m[38;5;12mencryption[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mnot[39m[38;5;12m [39m[38;5;12mequivalent[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12msingle[39m[38;5;12m [39m[38;5;12mDES[39m[38;5;12m [39m[38;5;12mencryption[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mmeans[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12msize[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12msubgroup[39m[38;5;12m [39m[38;5;12mgenerated[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mset[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mDES[39m[38;5;12m [39m[38;5;12mpermutations[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mgreater[39m[38;5;12m [39m[38;5;12mthan[39m[38;5;12m [39m[38;5;12m10^2499,[39m[38;5;12m [39m[38;5;12mwhich[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mtoo[39m[38;5;12m [39m[38;5;12mlarge[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mpotential[39m[38;5;12m [39m
|
||||
[38;5;12mattacks[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mDES,[39m[38;5;12m [39m[38;5;12mwhich[39m[38;5;12m [39m[38;5;12mwould[39m[38;5;12m [39m[38;5;12mexploit[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12msmall[39m[38;5;12m [39m[38;5;12msubgroup.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDES[0m[38;5;14m[1m [0m[38;5;14m[1mis[0m[38;5;14m[1m [0m[38;5;14m[1mnot[0m[38;5;14m[1m [0m[38;5;14m[1ma[0m[38;5;14m[1m [0m[38;5;14m[1mgroup[0m[38;5;12m [39m[38;5;12m(https://link.springer.com/content/pdf/10.1007/3-540-48071-4_36.pdf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mOld[39m[38;5;12m [39m[38;5;12mbut[39m[38;5;12m [39m[38;5;12mgold[39m[38;5;12m [39m[38;5;12mmathematical[39m[38;5;12m [39m[38;5;12mproof[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mset[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mDES[39m[38;5;12m [39m[38;5;12mpermutations[39m[38;5;12m [39m[38;5;12m(encryption[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mdecryption[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12meach[39m[38;5;12m [39m[38;5;12mDES[39m[38;5;12m [39m[38;5;12mkey)[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mnot[39m[38;5;12m [39m[38;5;12mclosed[39m[38;5;12m [39m[38;5;12munder[39m[38;5;12m [39m[38;5;12mfunctional[39m[38;5;12m [39m[38;5;12mcomposition.[39m[38;5;12m [39m
|
||||
[38;5;12mThat[39m[38;5;12m [39m[38;5;12mmeans[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mmultiple[39m[38;5;12m [39m[38;5;12mDES[39m[38;5;12m [39m[38;5;12mencryption[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mnot[39m[38;5;12m [39m[38;5;12mequivalent[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12msingle[39m[38;5;12m [39m[38;5;12mDES[39m[38;5;12m [39m[38;5;12mencryption[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mmeans[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12msize[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12msubgroup[39m[38;5;12m [39m[38;5;12mgenerated[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mset[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mDES[39m[38;5;12m [39m[38;5;12mpermutations[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mgreater[39m[38;5;12m [39m[38;5;12mthan[39m[38;5;12m [39m[38;5;12m10^2499,[39m[38;5;12m [39m[38;5;12mwhich[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mtoo[39m[38;5;12m [39m[38;5;12mlarge[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mpotential[39m[38;5;12m [39m[38;5;12mattacks[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mDES,[39m[38;5;12m [39m[38;5;12mwhich[39m[38;5;12m [39m
|
||||
[38;5;12mwould[39m[38;5;12m [39m[38;5;12mexploit[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12msmall[39m[38;5;12m [39m[38;5;12msubgroup.[39m
|
||||
|
||||
[38;2;255;187;0m[4mCryptanalysis[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDifferential Cryptanalysis of Salsa20/8[0m[38;5;12m (https://web.archive.org/web/20220710225943/https://www.ecrypt.eu.org/stream/papersdir/2007/010.pdf) - A great example of stream cipher cryptanalysis, by Yukiyasu Tsunoo et al.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSlide Attacks on a Class of Hash Functions[0m[38;5;12m (https://eprint.iacr.org/2008/263) - Applying slide attacks (typical cryptanalysis technique for block ciphers) to hash functions, M. Gorski et al.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSelf-Study[0m[38;5;14m[1m [0m[38;5;14m[1mCourse[0m[38;5;14m[1m [0m[38;5;14m[1min[0m[38;5;14m[1m [0m[38;5;14m[1mBlock[0m[38;5;14m[1m [0m[38;5;14m[1mCipher[0m[38;5;14m[1m [0m[38;5;14m[1mCryptanalysis[0m[38;5;12m [39m[38;5;12m(https://www.schneier.com/academic/archives/2000/01/self-study_course_in.html)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mAttempt[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12morganize[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mexisting[39m[38;5;12m [39m[38;5;12mliterature[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mblock-cipher[39m[38;5;12m [39m[38;5;12mcryptanalysis[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mway[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mstudents[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12muse[39m[38;5;12m [39m
|
||||
[38;5;12mto[39m[38;5;12m [39m[38;5;12mlearn[39m[38;5;12m [39m[38;5;12mcryptanalytic[39m[38;5;12m [39m[38;5;12mtechniques[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mways[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mbreak[39m[38;5;12m [39m[38;5;12mnew[39m[38;5;12m [39m[38;5;12malgorithms,[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mBruce[39m[38;5;12m [39m[38;5;12mSchneier.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSelf-Study[0m[38;5;14m[1m [0m[38;5;14m[1mCourse[0m[38;5;14m[1m [0m[38;5;14m[1min[0m[38;5;14m[1m [0m[38;5;14m[1mBlock[0m[38;5;14m[1m [0m[38;5;14m[1mCipher[0m[38;5;14m[1m [0m[38;5;14m[1mCryptanalysis[0m[38;5;12m [39m[38;5;12m(https://www.schneier.com/academic/archives/2000/01/self-study_course_in.html)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mAttempt[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12morganize[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mexisting[39m[38;5;12m [39m[38;5;12mliterature[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mblock-cipher[39m[38;5;12m [39m[38;5;12mcryptanalysis[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mway[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mstudents[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12muse[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mlearn[39m[38;5;12m [39m
|
||||
[38;5;12mcryptanalytic[39m[38;5;12m [39m[38;5;12mtechniques[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mways[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mbreak[39m[38;5;12m [39m[38;5;12mnew[39m[38;5;12m [39m[38;5;12malgorithms,[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mBruce[39m[38;5;12m [39m[38;5;12mSchneier.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mStatistical Cryptanalysis of Block Ciphers[0m[38;5;12m (http://crypto.junod.info/phdthesis.pdf) - By Pascal Junod.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCryptanalysis of block ciphers and protocols[0m[38;5;12m (https://web.archive.org/web/20220929023539/http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-info.cgi/2006/PHD/PHD-2006-04) - By Elad Pinhas Barkan.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mToo much crypto[0m[38;5;12m (https://eprint.iacr.org/2019/1492.pdf) - Analysis of number of rounds for symmetric cryptography primitives, and suggestions to do fewer rounds, by Jean-Philippe Aumasson.[39m
|
||||
@@ -144,8 +142,8 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCurve25519: new Diffie-Hellman speed records[0m[38;5;12m (https://cr.yp.to/ecdh/curve25519-20060209.pdf) - Paper on Curve25519.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSoftware implementation of the NIST elliptic curves over prime fields[0m[38;5;12m (http://delta.cs.cinvestav.mx/~francisco/arith/julio.pdf) - Pracitcal example of implementing elliptic curve crypto, by M. Brown et al.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHigh-speed high-security signatures[0m[38;5;12m (https://ed25519.cr.yp.to/ed25519-20110926.pdf) - Seminal paper on EdDSA signatures on ed25519 curve by Daniel J. Bernstein et al.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRecommendations[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1mDiscrete[0m[38;5;14m[1m [0m[38;5;14m[1mLogarithm-Based[0m[38;5;14m[1m [0m[38;5;14m[1mCryptography:[0m[38;5;14m[1m [0m[38;5;14m[1mElliptic[0m[38;5;14m[1m [0m[38;5;14m[1mCurve[0m[38;5;14m[1m [0m[38;5;14m[1mDomain[0m[38;5;14m[1m [0m[38;5;14m[1mParameters[0m[38;5;14m[1m [0m[38;5;14m[1m(NIST[0m[38;5;14m[1m [0m[38;5;14m[1mSP[0m[38;5;14m[1m [0m[38;5;14m[1m800-186)[0m[38;5;12m [39m[38;5;12m(https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-186.pdf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mOfficial[39m[38;5;12m [39m[38;5;12mNIST[39m[38;5;12m [39m[38;5;12mguide[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12msecurely[39m[38;5;12m [39m[38;5;12mimplement[39m[38;5;12m [39m
|
||||
[38;5;12melliptic[39m[38;5;12m [39m[38;5;12mcurves.[39m[38;5;12m [39m[38;5;12mIt[39m[38;5;12m [39m[38;5;12malso[39m[38;5;12m [39m[38;5;12mincludes[39m[38;5;12m [39m[38;5;12mmath[39m[38;5;12m [39m[38;5;12mshortcuts,[39m[38;5;12m [39m[38;5;12moptimizations[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mpossible[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mrisk[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mwrong[39m[38;5;12m [39m[38;5;12malgorithm[39m[38;5;12m [39m[38;5;12mimplementation.[39m[38;5;12m [39m[38;5;14m[1m(February[0m[38;5;14m[1m [0m[38;5;14m[1m2023)[0m[38;5;12m [39m[38;5;12m(https://csrc.nist.gov/pubs/sp/800/186/final)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRecommendations[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1mDiscrete[0m[38;5;14m[1m [0m[38;5;14m[1mLogarithm-Based[0m[38;5;14m[1m [0m[38;5;14m[1mCryptography:[0m[38;5;14m[1m [0m[38;5;14m[1mElliptic[0m[38;5;14m[1m [0m[38;5;14m[1mCurve[0m[38;5;14m[1m [0m[38;5;14m[1mDomain[0m[38;5;14m[1m [0m[38;5;14m[1mParameters[0m[38;5;14m[1m [0m[38;5;14m[1m(NIST[0m[38;5;14m[1m [0m[38;5;14m[1mSP[0m[38;5;14m[1m [0m[38;5;14m[1m800-186)[0m[38;5;12m [39m[38;5;12m(https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-186.pdf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mOfficial[39m[38;5;12m [39m[38;5;12mNIST[39m[38;5;12m [39m[38;5;12mguide[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12msecurely[39m[38;5;12m [39m[38;5;12mimplement[39m[38;5;12m [39m[38;5;12melliptic[39m[38;5;12m [39m
|
||||
[38;5;12mcurves.[39m[38;5;12m [39m[38;5;12mIt[39m[38;5;12m [39m[38;5;12malso[39m[38;5;12m [39m[38;5;12mincludes[39m[38;5;12m [39m[38;5;12mmath[39m[38;5;12m [39m[38;5;12mshortcuts,[39m[38;5;12m [39m[38;5;12moptimizations[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mpossible[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mrisk[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mwrong[39m[38;5;12m [39m[38;5;12malgorithm[39m[38;5;12m [39m[38;5;12mimplementation.[39m[38;5;12m [39m[38;5;14m[1m(February[0m[38;5;14m[1m [0m[38;5;14m[1m2023)[0m[38;5;12m [39m[38;5;12m(https://csrc.nist.gov/pubs/sp/800/186/final)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBiased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies[0m[38;5;12m (https://eprint.iacr.org/2019/023.pdf) - Computing private keys by analyzing and exploiting biases in ECDSA nonces.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMinerva: The curse of ECDSA nonces[0m[38;5;12m (https://eprint.iacr.org/2020/728.pdf) - Exploiting timing/bit-length leaks for recovering private keys from ECDSA signatures[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage[0m[38;5;12m (https://eprint.iacr.org/2020/615.pdf) - Breaking 160-bit curve ECDSA using less than one bit leakage.[39m
|
||||
@@ -177,13 +175,14 @@
|
||||
|
||||
[38;2;255;187;0m[4mPost-quantum cryptography[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPost-quantum cryptography - dealing with the fallout of physics success[0m
|
||||
[38;5;12m (https://eprint.iacr.org/2017/314.pdf) - Brief observation of mathematical tasks that can be used to build cryptosystems secure against attacks by post-quantum computers.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mKyber[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mDilithium[0m[38;5;12m [39m[38;5;12m(https://cryptography101.ca/kyber-dilithium)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mThese[39m[38;5;12m [39m[38;5;12mlectures[39m[38;5;12m [39m[38;5;12mdescribe[39m[38;5;12m [39m[38;5;12mKyber[39m[38;5;12m [39m[38;5;12m(ML-KEM)[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mDilithium[39m[38;5;12m [39m[38;5;12m(ML-DSA),[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mquantum-safe[39m[38;5;12m [39m[38;5;12mlattice-based[39m[38;5;12m [39m[38;5;12mkey[39m[38;5;12m [39m[38;5;12mencapsulation[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12msignature[39m[38;5;12m [39m[38;5;12mschemes[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mwere[39m[38;5;12m [39m[38;5;12mstandardized[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mAugust[39m[38;5;12m [39m[38;5;12m2024[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m
|
||||
[38;5;12mthe[39m[38;5;12m [39m[38;5;12mNational[39m[38;5;12m [39m[38;5;12mInstitute[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mStandards[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mTechnology[39m[38;5;12m [39m[38;5;12m(NIST).[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPost-quantum cryptography - dealing with the fallout of physics success[0m[38;5;12m (https://eprint.iacr.org/2017/314.pdf) - Brief observation of mathematical tasks that can be used to build cryptosystems secure against attacks by post-quantum computers.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPost-quantum[0m[38;5;14m[1m [0m[38;5;14m[1mcryptography[0m[38;5;12m [39m[38;5;12m(https://web.archive.org/web/20210510200628/https://www.researchgate.net/profile/Nicolas-Sendrier-2/publication/226115302_Code-Based_Cryptography/links/540d62d50cf2df04e7549388/Code-Based-Cryptography.pdf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m
|
||||
[38;5;12mIntroduction[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mpost-quantum[39m[38;5;12m [39m[38;5;12mcryptography.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPost-quantum RSA[0m[38;5;12m (https://cr.yp.to/papers/pqrsa-20170419.pdf) - Daniel Bernshtein's insight how to save RSA in post-quantum period.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMAYO:[0m[38;5;14m[1m [0m[38;5;14m[1mPractical[0m[38;5;14m[1m [0m[38;5;14m[1mPost-Quantum[0m[38;5;14m[1m [0m[38;5;14m[1mSignatures[0m[38;5;14m[1m [0m[38;5;14m[1mfrom[0m[38;5;14m[1m [0m[38;5;14m[1mOil-and-Vinegar[0m[38;5;14m[1m [0m[38;5;14m[1mMaps[0m[38;5;12m [39m[38;5;12m(https://eprint.iacr.org/2021/1144.pdf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mOil[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mVinegar[39m[38;5;12m [39m[38;5;12msignature[39m[38;5;12m [39m[38;5;12mscheme,[39m[38;5;12m [39m[38;5;12mproposed[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12m1997[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mPatarin,[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mone[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12moldest[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mbest-understood[39m[38;5;12m [39m[38;5;12mmultivariate[39m[38;5;12m [39m
|
||||
[38;5;12mquadratic[39m[38;5;12m [39m[38;5;12msignature[39m[38;5;12m [39m[38;5;12mschemes.[39m[38;5;12m [39m[38;5;12mIt[39m[38;5;12m [39m[38;5;12mhas[39m[38;5;12m [39m[38;5;12mexcellent[39m[38;5;12m [39m[38;5;12mperformance[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12msignature[39m[38;5;12m [39m[38;5;12msizes.[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12mpaper[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mabout[39m[38;5;12m [39m[38;5;12menhancing[39m[38;5;12m [39m[38;5;12mthis[39m[38;5;12m [39m[38;5;12malgorithm[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12musage[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mpost-quantum[39m[38;5;12m [39m[38;5;12mera.[39m[38;5;12m [39m[38;5;14m[1mOfficial[0m[38;5;14m[1m [0m[38;5;14m[1mwebsite[0m[38;5;12m [39m[38;5;12m(https://pqmayo.org/).[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMAYO:[0m[38;5;14m[1m [0m[38;5;14m[1mPractical[0m[38;5;14m[1m [0m[38;5;14m[1mPost-Quantum[0m[38;5;14m[1m [0m[38;5;14m[1mSignatures[0m[38;5;14m[1m [0m[38;5;14m[1mfrom[0m[38;5;14m[1m [0m[38;5;14m[1mOil-and-Vinegar[0m[38;5;14m[1m [0m[38;5;14m[1mMaps[0m[38;5;12m [39m[38;5;12m(https://eprint.iacr.org/2021/1144.pdf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mOil[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mVinegar[39m[38;5;12m [39m[38;5;12msignature[39m[38;5;12m [39m[38;5;12mscheme,[39m[38;5;12m [39m[38;5;12mproposed[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12m1997[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mPatarin,[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mone[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12moldest[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mbest-understood[39m[38;5;12m [39m[38;5;12mmultivariate[39m[38;5;12m [39m[38;5;12mquadratic[39m[38;5;12m [39m
|
||||
[38;5;12msignature[39m[38;5;12m [39m[38;5;12mschemes.[39m[38;5;12m [39m[38;5;12mIt[39m[38;5;12m [39m[38;5;12mhas[39m[38;5;12m [39m[38;5;12mexcellent[39m[38;5;12m [39m[38;5;12mperformance[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12msignature[39m[38;5;12m [39m[38;5;12msizes.[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12mpaper[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mabout[39m[38;5;12m [39m[38;5;12menhancing[39m[38;5;12m [39m[38;5;12mthis[39m[38;5;12m [39m[38;5;12malgorithm[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12musage[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mpost-quantum[39m[38;5;12m [39m[38;5;12mera.[39m[38;5;12m [39m[38;5;14m[1mOfficial[0m[38;5;14m[1m [0m[38;5;14m[1mwebsite[0m[38;5;12m [39m[38;5;12m(https://pqmayo.org/).[39m
|
||||
|
||||
|
||||
|
||||
@@ -191,11 +190,10 @@
|
||||
|
||||
[38;5;12mThat seems somewhat out of scope, isn't it? But these are books only fully available online for free. Read them as a sequence of papers if you will.[39m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mA Graduate Course in Applied Cryptography[0m
|
||||
[38;5;12m (https://crypto.stanford.edu/~dabo/cryptobook/) - By Dan Boneh and Victor Shoup. A well-balanced introductory course into cryptography, a bit of cryptanalysis and cryptography-related security.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mA Graduate Course in Applied Cryptography[0m[38;5;12m (https://crypto.stanford.edu/~dabo/cryptobook/) - By Dan Boneh and Victor Shoup. A well-balanced introductory course into cryptography, a bit of cryptanalysis and cryptography-related security.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAnalysis and design of cryptographic hash functions, MAC algorithms and block ciphers[0m
|
||||
[38;5;12m (https://web.archive.org/web/20220209130435/https://www.esat.kuleuven.be/cosic/publications/thesis-16.pdf) - Broad overview of design and cryptanalysis of various ciphers and hash functions, by Bart Van Rompay.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCrypTool book[0m[38;5;12m (https://www.cryptool.org/en/ctp-documentation/ctbook) - Predominantly mathematically oriented information on learning, using and experimenting cryptographic procedures.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCrypTool book[0m[38;5;12m (https://www.cryptool.org/en/ctbook/) - Predominantly mathematically oriented information on learning, using and experimenting cryptographic procedures.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHandbook of Applied Cryptography[0m[38;5;12m (https://cacr.uwaterloo.ca/hac/) - By Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone. Good classical introduction into cryptography and ciphers.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe joy of Cryptography[0m[38;5;12m (http://web.engr.oregonstate.edu/~rosulekm/crypto/) - By Mike Rosulek. A lot of basic stuff covered really well. No ECC.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mA Computational Introduction to Number Theory and Algebra[0m[38;5;12m (http://www.shoup.net/ntb/) - By Victor Shoup, excellent starters book on math universally used in cryptography. [39m
|
||||
@@ -229,3 +227,5 @@
|
||||
[38;5;14m[1m![0m[38;5;12mCC0[39m[38;5;14m[1m (http://mirrors.creativecommons.org/presskit/buttons/88x31/svg/cc-zero.svg)[0m[38;5;12m (https://creativecommons.org/publicdomain/zero/1.0/)[39m
|
||||
|
||||
[38;5;12mTo the extent possible under law, author has waived all copyright and related or neighboring rights to this work.[39m
|
||||
|
||||
[38;5;12mcryptopapers Github: https://github.com/pFarb/awesome-crypto-papers[39m
|
||||
|
||||
Reference in New Issue
Block a user