- Ankit Fadia - Encryption Algorithms Torn Apart
- http://www.ankitfadia.com/algorithms.htm
-
- Anonymity & Privacy On the Internet
-
- Security File Wiping
http://www.stack.nl/~galactus/remailers/index-wipe.html
- Wiping Swap Files
http://www.stack.nl/~galactus/remailers/wipeswap.html
-
- Attacks on Steganographic Systems
- http://wwwrn.inf.tu-dresden.de/~westfeld/attacks.html
-
- The Australian Crypto FAQ
- http://www.efa.org.au/Issues/Crypto/cryptfaq.html
-
- BCVG - Encryption Articles
- http://www.ebcvg.com/category.php?cat=12&p=1
-
- Bill Unruh's Cryptography Page
- http://axion.physics.ubc.ca/crypt.html
-
- A Brief Comparison of Email Encryption Protocols
- http://www.arraydev.com/commerce/JIBC/9603-2.htm
-
- A Brief History of Cryptography
- http://www.cybercrimes.net/Cryptography/Articles/Hebert.html
-
- C4I.org - Strong Cryptography Links on the Internet
- http://www.c4i.org/erehwon/crypto.html
-
- CanCrypt: Canadian cryptologic sources
- http://www.privacy.nb.ca/cancrypt/
-
- CDT - Encryption Privacy & Security Resources
- http://www.cdt.org/crypto/
-
- CERBERUS - Encryption vs. Windows: An Introductory Tutorial
- http://www.cerberussystems.com/INFOSEC/index.htm
- or http://www.cerberussystems.com/INFOSEC/tutorial/index.htm
-
- Commercial Data Recovery
- http://www.cypherspace.org/adam/cdr/
-
- The Complete, Unofficial TEMPEST Information Page
- http://www.eskimo.com/~joelm/tempestintro.html
-
- Counterpane (Bruce Schneier)

-
- Bruce Schneier's Home Page
http://www.schneier.com/index.html
- Crypto-Gram
http://www.counterpane.com/crypto-gram.html
- Home Page
http://www.counterpane.com/
- Literature
http://www.counterpane.com/literature.html
- Minimal Key Lengths for Symmetric Ciphers
http://www.schneier.com/paper-keylength.html
- Publications
http://www.counterpane.com/publish.html
- Publications (Bruce Schneier)
http://www.schneier.com/essays.html
-
- CryptNET
- http://www.cryptnet.net/

-
- Crypto 101
- http://www.aspencrypt.com/crypto101.html
-
- crypto.com (Matt Blaze)
- http://www.crypto.com/
-
- Crypto Courses Online
- http://www.und.edu/org/crypto/crypto/links/courses.html
-
- CryptoGate
- http://mediafilter.org/caq/cryptogate/
-
- Cryptographic Protection
- http://all.net/books/ip/Chap2.html
-
- Cryptographic Standards Library
- http://www.cerberussystems.com/INFOSEC/stds/index.htm
-
- Cryptography Defined/Brief History
- http://www.wakecomp.com/josh/history.html
-
- Cryptography & Information Security Research Group
- http://www.crypto.ethz.ch/
-
- Cryptography & Liberty
- http://www2.epic.org/reports/crypto2000/
-
- Cryptography & Liberty (book)
- http://www.epic.org/bookstore/crypto00&/
-
- Cryptography - An Overview
- http://www.hack.gr/users/dij/crypto/overview/
-
- The Cryptography Project
- http://www.cs.georgetown.edu/~denning/crypto/index.html
-
- Cryptography's Role in Securing the Information Society (Dam & Lin)
- http://www4.nationalacademies.org/cpsma/cstb.nsf/web/pub_crisis...
- or http://www.nap.edu/readingroom/books/crisis/
-
- Crypto Law Survey
- http://rechten.kub.nl/koops/cryptolaw/index.htm
-
- Cryptology Pointers

- http://www.tcs.hut.fi/~helger/crypto/
-
- Cryptome

- http://cryptome.org/
-
- Crypto Publications Online

- http://www.cryptosoft.com/html/secpub.htm
-
- Cryptorights Foundation
- http://www.cryptorights.org/
-
- CryptoSavvy - Key Sizes
- http://www.cryptosavvy.com/keysizes.htm

-
- CryptoSoft - Security & Privacy Links

- http://www.cryptosoft.com/html/privacy.htm
-
- crypto.yashy.com
- http://crypto.yashy.com/
-
- CS 165 - Computer Security
- http://www.cs.ucr.edu/~brett/cs165_s01/cs165.html
-
- Cypherpunks Archives (Venona)
- http://cypherpunks.venona.com/
-
- Cypherpunks Home Page
- http://www.csua.berkeley.edu/cypherpunks/Home.html
-
- David Wagner's Crypto Links
- http://www.cs.berkeley.edu/~daw/crypto.html
-
- Defeating Statistical Steganalysis
- http://www.citi.umich.edu/u/provos/stego/
-
- Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, & XML
- http://world.std.com/~dtd/sign_encrypt/sign_encrypt7.html
-
- Dept. of Commerce - Commercial Encryption Export Controls
- http://www.bxa.doc.gov/encryption/
-
- Descriptions of Key Escrow Systems
- http://www.cosc.georgetown.edu/~denning/crypto/Appendix.html
-
- Diffie-Hellman Method For Key Agreement
- http://apocalypse.org/pub/u/seven/diffie.html
-
- Disappearing Cryptography
- http://www.wayner.org/books/discrypt2/contents.php
-
- Electronic Frontiers Australia
- http://www.efa.org.au/Issues/Crypto/
-
- E-mail Encryption Made Simple
- http://www.ipc.on.ca/scripts/index_.asp?action=31&P_ID=11401
-
- Encryption
- http://www.cybercrimes.net/Cryptography/Articles/Newburger.html
-
- Encryption & the First Amendment
- http://www.umd.umich.edu/casl/hum/comm/crypto~1.htm
-
- Encryption & the Fifth Amendment
- http://www.daviddfriedman.com/.../CCP97_ppr_Acosta_HD5thAdmt.html
-
- Encryption General
- http://www.ifs.univie.ac.at/~os/encrypti.htm
-
- EPIC
-
- Cryptography Policy: Crypto News & Documents
http://www.epic.org/crypto/
- United States v. Scarfo (Key-Logger Case)
http://www.epic.org/crypto/scarfo.html
-
- Francis Litterio - Cryptography: The Study of Encryption
- http://world.std.com/~franl/crypto.html
-
- Francis Litterio - The Mathematical Guts of RSA Encryption
- http://world.std.com/~franl/crypto/rsa-guts.html
-
- Frode Weierud's Cryptology Page
- http://frode.home.cern.ch/frode/crypto/index.html
-
- Handbook of Applied Cryptography
- http://www.cacr.math.uwaterloo.ca/hac/
-
- How Electronic Encryption Works & How It Will Change Your Business
- http://www.viacorp.com/crypto.html
-
- I Encrypt, Therefore I Am
- http://www.wired.com/wired/5.11/netizen_pr.html
-
- The Insider - Cryptography
- http://www.ticm.com/info/insider/old/mar1998.html
-
- Introduction to Encryption (Chad Cook)
- http://www.securityfocus.com/infocus/1181
-
- An Introduction to the Use of Encryption
(Peter Meyer)
- http://serendipity.magnet.ch/hermetic/crypto/intro.htm
-
- John Savard's Home Page

- http://home.ecn.ab.ca/~jsavard/crypto/entry.htm
-
- Mach5 Cryptography Archives
- http://www.kremlinencrypt.com/crypto/index.html
-
- MAW 97 Ciphers
- http://www.math.arizona.edu/~dsl/enigma.htm
-
- The Metaphor is the Key Cryptography, The Clipper Chip, & the Constitution (Michael Froomkin)
- http://www.swiss.ai.mit.edu/.../froomkin-metaphor/text.html
-
- Microsoft - Description of Symmetric & Asymmetric Encryption
- http://support.microsoft.com/default.aspx?scid=kb;EN-US;q246071
-
- NEC Research Institute - Encryption
- http://citeseer.nj.nec.com/Security/Encryption/
-
- Neil's Security & Privacy Resources
- http://www.jjtc.com/Security/
-
- Network Magazine - Public Key Cryptography
- http://www.networkmagazine.com/article/NMG20000724S0060
-
- neworder.box.sk - Cryptography
- http://www.neworder.box.sk/box.php3?...
-
- New York Times - "Encryption"
- http://www.nytimes.com/library/tech/reference/index-encrypt.html
-
- NIST
-
- AES Home Page
http://csrc.nist.gov/CryptoToolkit/aes/
- Cryptographic Toolkit
http://csrc.nist.gov/CryptoToolkit/ <
- Public-Key Cryptography
http://csrc.nist.gov/publications/nistpubs/800-2/800-2.txt <
-
- Overview of Cryptography
- http://www.garykessler.net/library/crypto.html
-
- Paj - Cryptography
- http://pajhome.org.uk/crypt/index.html
-
- PC Guardian Encryption Dictionary
- http://www.pcguardian.com/software/encryption_dict.html
-
- PC World - How It Works: Encryption
- http://www.pcworld.com/howto/article.asp?aid=15230
-
- Peter Gutmann

-
- Encryption & Security Tutorial
http://www.cs.auckland.ac.nz/~pgut001/tutorial/
- Home Page
http://www.cs.auckland.ac.nz/~pgut001/
- Secure Deletion of Data from Magnetic & Solid-State Memory
http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
or http://www.cypherus.com/resources/docs/shred.htm
- Security & Encryption Links
http://www.openpgp.fr.st/pgut-links.html
-
- Pilobilus - Strong Encryption
- http://home.mpinet.net/~pilobilus/CS09.html

-
- Pretty Good Politics (Simson Garfinkel)
- http://hotwired.lycos.com/packet/garfinkel/97/18/index2a.html
-
- PrivacyResources.org
- http://www.privacyresources.org/
-
- Ridge Cook - Practical Encryption
- http://groups.yahoo.com/group/PracticalEncryption/files/
-
- Ritter's Crypto Glossary & Dictionary of Technical Cryptography
- http://packetstorm.decepticons.org/crypt/GLOSSARY.HTM
- or http://packetstormsecurity.nl/crypt/GLOSSARY.HTM
-
- Roger Clarke

-
- Crypto-Confusion: Mutual Non-Comprehension Threatens Exploitation of the GII
http://www.anu.edu.au/.../CryptoConf.html
- Message Transmission Security (or 'Cryptography in Plain Text')
http://www.anu.edu.au/.../CryptoSecy.html
-
- Ronald L. Rivest

-
- Cryptography & Security Links
http://theory.lcs.mit.edu/~rivest/crypto-security.html
- Publications
http://theory.lcs.mit.edu/~rivest/publications.html
-
- Ross Anderson's ftp space
- http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/
-
- RSA Security

-
- Home Page
http://www.rsasecurity.com/
- RSA Labs CryptoBytes
http://www.rsasecurity.com/rsalabs/cryptobytes/index.html
- RSA Labs Cryptography FAQ
http://www.rsasecurity.com/rsalabs/faq/
-
- Sam Simpson's PGP DH vs. RSA FAQ

- http://www.scramdisk.clara.net/pgpfaq.html
-
- SANS Institute - Encryption & VPNs

- http://www.sans.org/rr/catindex.php?cat_id=20
-
- SANS Institute - Steganography

- http://www.sans.org/rr/catindex.php?cat_id=54
-
- Sarah Dean

-
- Attacking OTFE - Known Security Flaws in OTFE Systems
http://www.fortunecity.com/.../CertainOTFESecurityFlaws.htm
or http://ice.prohosting.com/.../CertainOTFESecurityFlaws.htm
- Disk & File Shredders - A Comparison
http://www.fortunecity.com/.../Comparison_Shredders.htm
or http://ice.prohosting.com/.../Comparison_Shredders.htm
- Home Page
http://www.fortunecity.com/.../index.htm
or http://ice.prohosting.com/.../index.htm
- On-The-Fly-Encryption - A Comparison
http://www.fortunecity.com/.../Comparison_OTFCrypto.htm
or http://ice.prohosting.com/.../Comparison_OTFCrypto.htm
-
- sci.crypt Cryptography FAQ
- http://www.faqs.org/faqs/cryptography-faq/
-
- Secure Electronic Marketplace for Europe - Security & Cryptography Links
- http://www.semper.org/sirene/outsideworld/security.html
-
- The Security & Encryption FAQ (Doctor Who)

- http://www.privacy.li/security_faq.htm (Rev. 17.6)
- or http://guysalias.on.kenyanweb.com/security_and_encryption_faq.txt (Rev. 17.6)
- or http://groups.google.com/groups?hl=en&group=alt.security.scramdisk... (Rev. 16.1)
-
- Security In Distributed Computing. Did You Lock the Door?
- http://www.networkcomputing.com/netdesign/1007part1comp.html
-
- security.tao.ca

- http://security.tao.ca/
-
- Selecting Cryptographic Key Sizes (Lenstra & Verheul)
- http://www.simovits.com/archive/cryptosizes.pdf (PDF document)
-
- Simon Singh
-
- Crypto Corner
http://www.simonsingh.net/owtasite/Crypto_Corner.html
- The Science of Secrecy
http://www.channel4.com/science/microsites/S/secrecy/index.html
-
- Slackers - Cryptography Introduction
- http://www.massconfusion.com/crypto/Lecture/topics.shtml
-
- Snake Oil FAQ - Encryption Software to Avoid

- http://www.interhack.net/people/cmcurtin/snake-oil-faq.html
-
- SSH - Cryptography A-Z

- http://www.ssh.com/support/cryptography/index.html
-
- Stanford - Applied Crypto
- http://crypto.stanford.edu/
-
- Steganography & Digital Watermarking
- http://www.isse.gmu.edu/~njohnson/Steganography/
-
- Steve Friedl's: An Illustrated Guide to Cryptographic Hashes

- http://unixwiz.net/techtips/iguide-crypto-hashes.html
-
- Steven Levy's Crypto Page
- http://mosaic.echonyc.com/~steven/crypto.html
-
- Suggesting Key Sizes for Cryptosystems
- http://www.cs.nps.navy.mil/.../keylength.html
-
- SuraSoft.com - Secure File Deletion
- http://www.surasoft.com/tut/secfiledel.htm
-
- The University of Virginia - "Privacy & Security On the Internet" (Crypto Intro)
- http://www.cs.virginia.edu/.../Privacy-and-Security-on-the-Internet.doc
-
- What DESCHALL Means (Matt Curtin)
- http://www.interhack.net/projects/deschall/what.html
-
- Whisperings - Digital Secrets
- http://www.geocities.com/whisperings.geo/links.html
-
- Why Johnny Can't Encrypt
- http://reports-archive.adm.cs.cmu.edu/anon/1998/abstracts/98-155.html
- or http://www.usenix.org/.../whitten_html/
- or http://www-2.cs.cmu.edu/~alma/johnny.pdf (PDF document)
-
- Why You Should Use Encryption
- http://www.goingware.com/encryption/
-
- William Unruh - Cryptography
- http://axion.physics.ubc.ca/crypt.html
|