update lists

This commit is contained in:
2025-07-18 22:22:32 +02:00
parent 55bed3b4a1
commit 5916c5c074
3078 changed files with 331679 additions and 357255 deletions

View File

@@ -1,4 +1,4 @@
 Awesome Crypto Papers !Awesome (https://raw.githubusercontent.com/sindresorhus/awesome/d2005375894e77d69827b0e3c17073bbf6f062d7/media/badge.svg) (https://github.com/sindresorhus/awesome)
 Awesome Crypto Papers !Awesome (https://raw.githubusercontent.com/sindresorhus/awesome/d2005375894e77d69827b0e3c17073bbf6f062d7/media/badge.svg) (https://github.com/sindresorhus/awesome)
A curated list of cryptography (https://en.wikipedia.org/wiki/Cryptography) papers, articles, tutorials and howtos for non-cryptographers.
@@ -8,12 +8,12 @@
Notes 
The goal of this list is to provide educational reading material for different levels of cryptographic knowledge. I started it because my day job onboarding engineers at Cossack Labs (https://www.cossacklabs.com) includes educating them
in cryptographic matters and giving advise what to read on specific topics, and that involves finding the same materials repeatedly. Hopefully, it will be useful for someone else as well. 
The goal of this list is to provide educational reading material for different levels of cryptographic knowledge. I started it because my day job onboarding engineers at Cossack Labs (https://www.cossacklabs.com) includes educating them in 
cryptographic matters and giving advise what to read on specific topics, and that involves finding the same materials repeatedly. Hopefully, it will be useful for someone else as well. 
It is aimed at people who are using cryptography in higher-level security systems to implement database encryption, secure sharing, end-to-end encryption in various schemes, and should understand how it works, how it fails and how it is
attacked. It is not a list of notable / important / historically important papers (although many of them are here). It is not aimed at academics (who have better grasp of what they need anyway), nor it is aimed for systematic study of 
wanna-be cryptographers (who better follow structured approach under professional guidance). 
It is aimed at people who are using cryptography in higher-level security systems to implement database encryption, secure sharing, end-to-end encryption in various schemes, and should understand how it works, how it fails and how it is attacked.
It is not a list of notable / important / historically important papers (although many of them are here). It is not aimed at academics (who have better grasp of what they need anyway), nor it is aimed for systematic study of wanna-be 
cryptographers (who better follow structured approach under professional guidance). 
It will be extended gradually as I find something of "must-have" value. Pull requests are very welcome.
@@ -53,8 +53,8 @@
General cryptographic interest
⟡ Another Look at “Provable Security” (https://eprint.iacr.org/2004/152.pdf) - Inquiries into formalism and naive intuition behind security proofs, by Neal Koblitz et al.
⟡ The security impact of a new cryptographic library (https://cryptojedi.org/papers/coolnacl-20120725.pdf) - Introductory paper on NaCl, discussing important aspects of implementing cryptography and using it as a larger building block 
in security systems, by Daniel J. Bernstein, Tanja Lange, Peter Schwabe.
⟡ The security impact of a new cryptographic library (https://cryptojedi.org/papers/coolnacl-20120725.pdf) - Introductory paper on NaCl, discussing important aspects of implementing cryptography and using it as a larger building block in security
systems, by Daniel J. Bernstein, Tanja Lange, Peter Schwabe.
@@ -80,27 +80,25 @@
⟡ Salsa20 family of stream ciphers (https://cr.yp.to/snuffle/salsafamily-20071225.pdf) - Broad explanation of Salsa20 security cipher by Daniel J. Bernstein.
⟡ New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba (https://eprint.iacr.org/2007/472.pdf) - Analysis of Salsa20 family of ciphers, by Jean-Philippe Aumasson et al.
⟡ ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS) (https://tools.ietf.org/html/draft-ietf-tls-chacha20-poly1305-04) - IETF Draft of ciphersuite family, by Adam Langley et al.
⟡ AES submission document on Rijndael
 (https://csrc.nist.gov/csrc/media/projects/cryptographic-standards-and-guidelines/documents/aes-development/rijndael-ammended.pdf#page=1) - Original Rijndael proposal by Joan Daemen and Vincent Rijmen.
⟡ AES submission document on Rijndael (https://csrc.nist.gov/csrc/media/projects/cryptographic-standards-and-guidelines/documents/aes-development/rijndael-ammended.pdf#page=1) - Original Rijndael proposal by Joan Daemen and Vincent Rijmen.
⟡ Ongoing Research Areas in Symmetric Cryptography
 (https://web.archive.org/web/20220209130448/https://www.ecrypt.eu.org/ecrypt1/documents/D.STVL.3-2.5.pdf) - Overview of ongoing research in secret key crypto and hashes by ECRYPT Network of Excellence in Cryptology.
⟡ The Galois/Counter Mode of Operation (GCM)
 (https://web.archive.org/web/20221007191258/https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.694.695&rep=rep1&type=pdf) - Original paper introducing GCM, by by David A. McGrew and John Viega.
⟡ The Galois/Counter Mode of Operation (GCM) (https://web.archive.org/web/20221007191258/https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.694.695&rep=rep1&type=pdf) - Original paper introducing GCM, by by David A. McGrew and John Viega.
⟡ The Security and Performance of the Galois/Counter Mode (GCM) of Operation (https://eprint.iacr.org/2004/193.pdf) - Design, analysis and security of GCM, and, more specifically, AES GCM mode, by David A. McGrew and John Viega.
⟡ GCM Security Bounds Reconsidered
 (https://www.iacr.org/archive/fse2015/85400168/85400168.pdf) - An analysis and algorithm for nonce generation for AES GCM with higher counter-collision probability, by Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata.
⟡ Proxy-Mediated Searchable Encryption in SQL Databases Using Blind Indexes
 (https://eprint.iacr.org/2019/806.pdf) - An overview of existing searchable encryption schemes, and analysis of scheme built on AES-GCM, blind index and bloom filter by Eugene Pilyankevich, Dmytro Kornieiev, Artem Storozhuk.
⟡ DES is not a group (https://link.springer.com/content/pdf/10.1007/3-540-48071-4_36.pdf) - Old but gold mathematical proof that the set of DES permutations (encryption and decryption for each DES key) is not closed under functional 
composition. That means that multiple DES encryption is not equivalent to single DES encryption and means that the size of the subgroup generated by the set of DES permutations is greater than 10^2499, which is too large for potential 
attacks on DES, which would exploit a small subgroup.
⟡ DES is not a group (https://link.springer.com/content/pdf/10.1007/3-540-48071-4_36.pdf) - Old but gold mathematical proof that the set of DES permutations (encryption and decryption for each DES key) is not closed under functional composition. 
That means that multiple DES encryption is not equivalent to single DES encryption and means that the size of the subgroup generated by the set of DES permutations is greater than 10^2499, which is too large for potential attacks on DES, which 
would exploit a small subgroup.
Cryptanalysis
⟡ Differential Cryptanalysis of Salsa20/8 (https://web.archive.org/web/20220710225943/https://www.ecrypt.eu.org/stream/papersdir/2007/010.pdf) - A great example of stream cipher cryptanalysis, by Yukiyasu Tsunoo et al.
⟡ Slide Attacks on a Class of Hash Functions (https://eprint.iacr.org/2008/263) - Applying slide attacks (typical cryptanalysis technique for block ciphers) to hash functions, M. Gorski et al.
⟡ Self-Study Course in Block Cipher Cryptanalysis (https://www.schneier.com/academic/archives/2000/01/self-study_course_in.html) - Attempt to organize the existing literature of block-cipher cryptanalysis in a way that students can use 
to learn cryptanalytic techniques and ways to break new algorithms, by Bruce Schneier.
⟡ Self-Study Course in Block Cipher Cryptanalysis (https://www.schneier.com/academic/archives/2000/01/self-study_course_in.html) - Attempt to organize the existing literature of block-cipher cryptanalysis in a way that students can use to learn 
cryptanalytic techniques and ways to break new algorithms, by Bruce Schneier.
⟡ Statistical Cryptanalysis of Block Ciphers (http://crypto.junod.info/phdthesis.pdf) - By Pascal Junod.
⟡ Cryptanalysis of block ciphers and protocols (https://web.archive.org/web/20220929023539/http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-info.cgi/2006/PHD/PHD-2006-04) - By Elad Pinhas Barkan.
⟡ Too much crypto (https://eprint.iacr.org/2019/1492.pdf) - Analysis of number of rounds for symmetric cryptography primitives, and suggestions to do fewer rounds, by Jean-Philippe Aumasson.
@@ -144,8 +142,8 @@
⟡ Curve25519: new Diffie-Hellman speed records (https://cr.yp.to/ecdh/curve25519-20060209.pdf) - Paper on Curve25519.
⟡ Software implementation of the NIST elliptic curves over prime fields (http://delta.cs.cinvestav.mx/~francisco/arith/julio.pdf) - Pracitcal example of implementing elliptic curve crypto, by M. Brown et al.
⟡ High-speed high-security signatures (https://ed25519.cr.yp.to/ed25519-20110926.pdf) - Seminal paper on EdDSA signatures on ed25519 curve by Daniel J. Bernstein et al.
⟡ Recommendations for Discrete Logarithm-Based Cryptography: Elliptic Curve Domain Parameters (NIST SP 800-186) (https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-186.pdf) - Official NIST guide how securely implement 
elliptic curves. It also includes math shortcuts, optimizations and possible security risk of wrong algorithm implementation. (February 2023) (https://csrc.nist.gov/pubs/sp/800/186/final)
⟡ Recommendations for Discrete Logarithm-Based Cryptography: Elliptic Curve Domain Parameters (NIST SP 800-186) (https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-186.pdf) - Official NIST guide how securely implement elliptic 
curves. It also includes math shortcuts, optimizations and possible security risk of wrong algorithm implementation. (February 2023) (https://csrc.nist.gov/pubs/sp/800/186/final)
⟡ Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies (https://eprint.iacr.org/2019/023.pdf) - Computing private keys by analyzing and exploiting biases in ECDSA nonces.
⟡ Minerva: The curse of ECDSA nonces (https://eprint.iacr.org/2020/728.pdf) - Exploiting timing/bit-length leaks for recovering private keys from ECDSA signatures
⟡ LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage (https://eprint.iacr.org/2020/615.pdf) - Breaking 160-bit curve ECDSA using less than one bit leakage.
@@ -177,13 +175,14 @@
Post-quantum cryptography
⟡ Post-quantum cryptography - dealing with the fallout of physics success
 (https://eprint.iacr.org/2017/314.pdf) - Brief observation of mathematical tasks that can be used to build cryptosystems secure against attacks by post-quantum computers.
⟡ Kyber and Dilithium (https://cryptography101.ca/kyber-dilithium) - These lectures describe Kyber (ML-KEM) and Dilithium (ML-DSA), the quantum-safe lattice-based key encapsulation and signature schemes that were standardized in August 2024 by 
the National Institute of Standards and Technology (NIST).
⟡ Post-quantum cryptography - dealing with the fallout of physics success (https://eprint.iacr.org/2017/314.pdf) - Brief observation of mathematical tasks that can be used to build cryptosystems secure against attacks by post-quantum computers.
⟡ Post-quantum cryptography (https://web.archive.org/web/20210510200628/https://www.researchgate.net/profile/Nicolas-Sendrier-2/publication/226115302_Code-Based_Cryptography/links/540d62d50cf2df04e7549388/Code-Based-Cryptography.pdf) - 
Introduction to post-quantum cryptography.
⟡ Post-quantum RSA (https://cr.yp.to/papers/pqrsa-20170419.pdf) - Daniel Bernshtein's insight how to save RSA in post-quantum period.
⟡ MAYO: Practical Post-Quantum Signatures from Oil-and-Vinegar Maps (https://eprint.iacr.org/2021/1144.pdf) - The Oil and Vinegar signature scheme, proposed in 1997 by Patarin, is one of the oldest and best-understood multivariate 
quadratic signature schemes. It has excellent performance and signature sizes. This paper is about enhancing this algorithm in usage in the post-quantum era. Official website (https://pqmayo.org/).
⟡ MAYO: Practical Post-Quantum Signatures from Oil-and-Vinegar Maps (https://eprint.iacr.org/2021/1144.pdf) - The Oil and Vinegar signature scheme, proposed in 1997 by Patarin, is one of the oldest and best-understood multivariate quadratic 
signature schemes. It has excellent performance and signature sizes. This paper is about enhancing this algorithm in usage in the post-quantum era. Official website (https://pqmayo.org/).
@@ -191,11 +190,10 @@
That seems somewhat out of scope, isn't it? But these are books only fully available online for free. Read them as a sequence of papers if you will.
⟡ A Graduate Course in Applied Cryptography
 (https://crypto.stanford.edu/~dabo/cryptobook/) - By Dan Boneh and Victor Shoup. A well-balanced introductory course into cryptography, a bit of cryptanalysis and cryptography-related security.
⟡ A Graduate Course in Applied Cryptography (https://crypto.stanford.edu/~dabo/cryptobook/) - By Dan Boneh and Victor Shoup. A well-balanced introductory course into cryptography, a bit of cryptanalysis and cryptography-related security.
⟡ Analysis and design of cryptographic hash functions, MAC algorithms and block ciphers
 (https://web.archive.org/web/20220209130435/https://www.esat.kuleuven.be/cosic/publications/thesis-16.pdf) - Broad overview of design and cryptanalysis of various ciphers and hash functions, by Bart Van Rompay.
⟡ CrypTool book (https://www.cryptool.org/en/ctp-documentation/ctbook) - Predominantly mathematically oriented information on learning, using and experimenting cryptographic procedures.
⟡ CrypTool book (https://www.cryptool.org/en/ctbook/) - Predominantly mathematically oriented information on learning, using and experimenting cryptographic procedures.
⟡ Handbook of Applied Cryptography (https://cacr.uwaterloo.ca/hac/) - By Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone. Good classical introduction into cryptography and ciphers.
⟡ The joy of Cryptography (http://web.engr.oregonstate.edu/~rosulekm/crypto/) - By Mike Rosulek. A lot of basic stuff covered really well. No ECC.
⟡ A Computational Introduction to Number Theory and Algebra (http://www.shoup.net/ntb/) - By Victor Shoup, excellent starters book on math universally used in cryptography. 
@@ -229,3 +227,5 @@
!CC0 (http://mirrors.creativecommons.org/presskit/buttons/88x31/svg/cc-zero.svg) (https://creativecommons.org/publicdomain/zero/1.0/)
To the extent possible under law, author has waived all copyright and related or neighboring rights to this work.
cryptopapers Github: https://github.com/pFarb/awesome-crypto-papers