Strong
cryptography makes the world a safer place
or
(Kinky sex makes the
world go around)
This page
contains links and pointers to other web pages dealing with
cryptography and information security, No doubt that its very
incomplete, Please send additions and corrections to erehwon (at) c4i.org
Commercial
Organizations
University
Computer Sites
Cryptography
& Security Newsgroups
alt.politics.org.nsa
alt.security
alt.security.pgp
comp.lang.java.security
comp.os.netware.security
comp.security
comp.security.announce
comp.security.misc
comp.security.unix
sci.crypt
sci.crypt.research
talk.politics.crypto
Cryptography
Books & Publications
- Alan Turing: The Enigma by Andrew Hodges
- Algorithmic Number
Theory
- Aluminum Foil Deflector Beanie: Practical Mind
Control Protection for Paranoids by Lyle Zapato
- Applied Cryptography Bruce Schneier's Kung
Fu is very good!
- Basic Methods of
Cryptography by Jan C.A. Van Der
Lubbe
- Best Selling Security Books & More!
- Body of Secrets: Anatomy of the Ultra-Secret National Security Agency by James Bamford
- Clever Cryptograms by Louise B. Moll, Jim Sharpe (Illustrator)
- Cracking DES by Electronic
Frontier Foundation, & John Gilmore
- Cryptography: Theory and
Practice (Discrete Mathematics and Its Applications) by Douglas R.
Stinson
- Cryptologia A quarterly journal devoted to all aspects of cryptology
- Cryptology ePrint Archive
- Crypto: When the Rebels
Beat the Government, Saving Privacy in a Digital Age by Steven Levy
- Cryptonomicon by Neal Stephenson
- Decrypted Secrets: Methods
and Maxims of Cryptology by Friedrich Ludwig Bauer
- Elliptic Curves in
Cryptography by G. Seroussi, Nigel P.
Smart, Ian F. Blake
- Foundations of
Cryptography by Oded Goldreich
- Handbook of Applied
Cryptography by Alfred J. Menezes, Paul C.
Van Oorschot, Scott A. Vanstone
- Honeypots: Tracking Hackers by Lance Spitzner
- Implementing Elliptic Curve
Cryptography by Michael Rosing
- InfoSec News Mailing List Moderated
by William Knowles
- Journal of Computer Security
- Journal of Cryptology
- Honeypots Lance Spitzner
- Microsoft Security
Advisor Program
- Pseudorandomness and
Cryptographic Applications by Michael Luby
- Ritter's Crypto
Glossary and Dictionary of Technical Cryptography
- Security Engineering: A
Guide to Building Dependable Distributed Systems by Ross J. Anderson
- The Code Book: The Evolution
of Secrecy from Mary, Queen of Scots to Quantum
Cryptography by Simon Singh
- The Codebreakers; The
Comprehensive History of Secret Communication by David Kahn
- The Shellcoder's Handbook by Jack Koziol, David Litchfield, Dave Aitel,
Chris Anley, Sinan "noir" Eren, Neel Mehta, Riley Hassell
Number
Theory
Cryptographic
Algorithms & Protocols
Cryptographers
Home Pages
Cryptographic
Software & Security Tools
ECC
Elliptic Curve Cryptosystems
STU-III
(Secure Telephone III)
Other
Links
William Knowles erehwon (at) c4i.org
Last
Updated 02.17.2009
Hello to our
friends and fans in international surveillance!
In a world of chaos,
wrinkle-free pants keep you sane.