All Projects → pFarb → Awesome Crypto Papers

pFarb / Awesome Crypto Papers

Licence: other
A curated list of cryptography papers, articles, tutorials and howtos.

Projects that are alternatives of or similar to Awesome Crypto Papers

Keybase Gpg Github
Step-by-step guide on how to create a GPG key on keybase.io, adding it to a local GPG setup and using it with Git and GitHub.
Stars: ✭ 2,506 (+154.42%)
Mutual labels:  howto, cryptography
Cryptography
Cryptography Android application code samples / cipher collection for app users
Stars: ✭ 35 (-96.45%)
Mutual labels:  cryptography
Curl Collisions
An implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.
Stars: ✭ 20 (-97.97%)
Mutual labels:  cryptography
Datasafe
Datasafe - flexible and secure data storage and document sharing using cryptographic message syntax for data encryption
Stars: ✭ 32 (-96.75%)
Mutual labels:  cryptography
Sephia Five
A secure and PGP enabled webmail module for Phosphorus Five
Stars: ✭ 21 (-97.87%)
Mutual labels:  cryptography
Cl Tls
An implementation of TLS and related specifications in Common Lisp
Stars: ✭ 32 (-96.75%)
Mutual labels:  cryptography
Java Crypto Utils
Java Cryptographic, Encoding and Hash Utilities
Stars: ✭ 15 (-98.48%)
Mutual labels:  cryptography
Libpki
Easy-to-use high-level library for PKI-enabled applications
Stars: ✭ 36 (-96.35%)
Mutual labels:  cryptography
Guardedbox
Online client-side manager for secure storage and secrets sharing.
Stars: ✭ 34 (-96.55%)
Mutual labels:  cryptography
Claimchain Core
A core and experimental implementation of ClaimChain
Stars: ✭ 30 (-96.95%)
Mutual labels:  cryptography
Indurative
Easily create authenticated data structures
Stars: ✭ 30 (-96.95%)
Mutual labels:  cryptography
Howto Git Bisect
Find bugs quickly with `git bisect`
Stars: ✭ 27 (-97.26%)
Mutual labels:  howto
Ufonet
UFONet - Denial of Service Toolkit
Stars: ✭ 963 (-2.23%)
Mutual labels:  cryptography
Rbnacl
Ruby FFI binding to the Networking and Cryptography (NaCl) library (a.k.a. libsodium)
Stars: ✭ 910 (-7.61%)
Mutual labels:  cryptography
Ksuid
Java implementation of K-Sortable Globally Unique IDs
Stars: ✭ 35 (-96.45%)
Mutual labels:  cryptography
Blockchain Papers
区块链相关的有价值的文献
Stars: ✭ 20 (-97.97%)
Mutual labels:  cryptography
Lethean Vpn
Lethean Virtual Private Network (VPN)
Stars: ✭ 29 (-97.06%)
Mutual labels:  cryptography
Powersoftau
An independent implementation of the Powers of Tau MPC ceremony.
Stars: ✭ 32 (-96.75%)
Mutual labels:  cryptography
X25519
Public key cryptography library for Ruby providing the X25519 Diffie-Hellman function
Stars: ✭ 37 (-96.24%)
Mutual labels:  cryptography
Cryptoanalysis
CogniCrypt_SAST: CrySL-to-Static Analysis Compiler
Stars: ✭ 36 (-96.35%)
Mutual labels:  cryptography

Awesome Crypto Papers Awesome

A curated list of cryptography papers, articles, tutorials and howtos for non-cryptographers.

Notes

The goal of this list is to provide educational reading material for different levels of cryptographic knowledge. I started it because my day job onboarding engineers at Cossack Labs includes educating them in cryptographic matters and giving advise what to read on specific topics, and that involves finding the same materials repeatedly. Hopefully, it will be useful for someone else as well.

It is aimed at people who are using cryptography in higher-level security systems to implement database encryption, secure sharing, end-to-end encryption in various schemes, and should understand how it works, how it fails and how it is attacked. It is not a list of notable / important / historically important papers (although many of them are here). It is not aimed at academics (who have better grasp of what they need anyway), nor it is aimed for systematic study of wanna-be cryptographers (who better follow structured approach under professional guidance).

It will be extended gradually as I find something of "must-have" value. Pull requests are very welcome.

Contents

The list

Introducing people to data security and cryptography

Simple: cryptography for non-engineers

Brief introductions

General cryptographic interest


Specific topics

Hashing

Secret key cryptography

Cryptoanalysis

Public key cryptography: General and DLP

Public key cryptography: Elliptic-curve crypto

Zero Knowledge Proofs

Key Management

Math

  • PRIMES is in P - Unconditional deterministic polynomial-time algorithm that determines whether an input number is prime or composite.

Post-quantum cryptography


Books

That seems somewhat out of scope, isn't it? But these are books only fully available online for free. Read them as a sequence of papers if you will.


Lectures and educational courses


Online crypto challenges

Not exactly papers, but crypto challenges are awesome educational material.

License

CC0

To the extent possible under law, author has waived all copyright and related or neighboring rights to this work.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].