Security Books, Journals, Bibliographies, and Publications

This page is a subsection of the Crypto link farm. Links to further crypto and security-related information can be found there.

ACM Transactions on Information and System Security
(Just a call for papers at the moment).
Advanced Encryption Standard (AES) Development Effort
NIST's AES information page.
Aegean Park Press
Historical books on cryptography, intelligence, military history, and related topics.
A guide to 3GPP security documents
Overview of 3GPP/UMTS security documents.
alicebob
The story of Alice and Bob.
An Analysis of Security Incidents on the Internet 1989-1995
PhD thesis analysing 4,300 Internet security incidents.
An Electronic Pearl Harbor? Not Likely
Article debunking various Infowar myths.
An Introduction to Cryptography
Online book on cryptography (only the initial section is complete).
Archives for ansi-epay
ANSI e-paymnet list archives.
Archives of [email protected]
CryptoAPI mailing list archives.
Authentication, Key Agreement, and Key Exchange Protocols
Bibliography of key agreement protocols with links to authors and online papers.
Bibliography of Molecular Computation and Splicing Sytems
Bibliography on molecular computing, including attacking encryption systems using molecular computers.
Block Cipher Lounge
List of block ciphers, characteristics, and known attacks.
Block Cipher Lounge - AES
Current state of attacks on AES proposals
Brown Computer Science S/Key access
Information on the S/Key authentication protocol.
Camelot Knowledge Center
News and information on network security and crypto issues.
CAST Encryption Algorithm
Publications pertaining to the CAST encryption algorithm.
CEE VAR News
Central and East European Secure Systems Strategies (online security journal).
CHACS Publications
Centre for high-assurance computer systems publications.
Chablis - Market Analysis of Digital Payment Systems
Very comprehensive analysis of a wide variety of electronic payment systems.
Charles Blair's Notes on Cryptography
Number theory, public-key encryption, RNG's.
Checkliste für den datenschutzgerechten Einsatz von Windows NT
Guidelines for securiny an NT system (other than by unplugging it).
Code Signing for Java Applets
Howto for Java code signing for Netscape and MS products.
The Collection of Computer Science Bibliographies
About 1000 CS bibliographies with around 800,000 references.
Collection of Lecture Notes, Survey Papers, etc
Assorted lecture notes and papers, including ones on crypto.
Communication Theory of Secrecy Systems
Scanned images of Shannon's classic communications security paper from the Bell Systems Technical Journal.
Computer & Communications Security Reviews
Abstracts of new computer security-related publications.
Computer Immune Systems -- Research
Immunology concepts applied to computer security problems.
Computer Science Technical Reports Archive Sites
Links to sites which distribute CS tech reports.
Computer Services : Administrator's Pages : NT stuff
Installing a student-proof NT setup.
Computer Virus Handbook
Seven Locks' online virus handbook.
Computer Virus Myths treatise
Comprehensive collection of virus myths, hoaxes, and vendor press releases.
Cora Research Paper Search
Security and encryption paper search engine.
Counterpane Homepage
Bruce Schneier's "Applied Cryptography" information.
Credit Card Transactions: Home Page
Overview of CC terms and mechanisms, including discussion of various online CC processing methods.
cryp.to -- The Cryptographic WWW Server
Various PGP developers list archives.
Crypt Newsletter Homepage
Various reports from the computer underground on hacking, security, viruses, hackers, and related issues. Many of the reports debunk common urban legends and media myths about computer security.
Crypto Glossary
Terry Ritter's crypto glossary (long).
Cryptography
Good overview of cryptography, digital signatures, certificates, and trust management.
Cryptography and Number Theory for Digital Cash
Introduction to crypto and number theory for digital cash.
Cryptography Reference
CryptoAPI reference from MSDN.
Cryptography: some important points for beginners
Crypto FAQ for beginners.
Cryptology ePrint Archive
IACR archive of crypto research papers.
Cryptologia.
Cryptosystems Journal Home Page
CSL Bulletins
NIST Computer Science Laboratory bulletins
CSPP - Reports
Computer Systems Policy Project reports, including several covering encryption and e-commerce.
CuD "Computer Underground E-Publications - Top Level" Archive
Cypherpunks mailing list archive.
Cypherpunks Distributed Archive
Archive of cypherpunks posts from 1992-1994.
Cypherpunks HyperArchive
Cypherpunks mailing list archive.
Dabbling in Cryptography
1970's cryptanalysis of the M-209.
Data Encryption Page
Overview of encryption and encryption algorithms, links to further information.
Data Security by Design
Designing buildings to thwart electronic eavesdropping.
David Wagner's Crypto Posts
General cryptography, cryptanalysis, computer security.
DDJ Crypto CD
Several notable crypto books collected onto one CDROM.
DDJ, December 1998
DDJ issue on computer security including Twofish, Panama, e-commerce protocols, and smart cards.
des-coding List Archive
Archive of the des-coding mailing list.
Developer - Mac OS X Security
Mac OS X security reference.
Disk and File Shredders: A Comparison
Comparison of various (Windows-based) file erasing programs.
dp6 and the 7th USENIX security symposium
Writeup and photos from the 7th Usenix security symposium.
e$ Home Page
The e$ mailing list, information on digital cash clearing, digital bearer bonds, financial cryptography, and related topics.
eCashdev
eCash information and documentation.
[E-CARM] E-Commerce and Rights Management
E-commerce mailing list and archives.
ECC FAQ
Elliptic curve cryptography FAQ.
ECS 153 Winter 1998, Robust Programming
Tutorial on robust programming.
EIT Creations: Secure HTTP
Information on the SHTTP protocol.
Electronic Surveillance
Large archive of documents on electronic surveillance.
Electronic Voting
Papers and links to electronic voting information.
Elliptic Curve Cryptography
Tutorial on elliptic curve crypto.
Elliptic Curves and Cryptology
Elliptic curve bibliography.
Elliptic Curve Tutorials
Tutorial on elliptic-curve crypto.
Encryption and Internet Privacy in the digital age
Encryption and privacy information.
Encryption News Resource Page
Encryption and security-related news stories.
Enigma and Its Decryption
Details on the Enigma machine and software simulators.
Enigma and the Turing Bombe
Description of the Bombe and bombe simulator.
Entrust Whitepapers
Entrust white papers and tutorials on security, encryption, certification.
EPFL - LSE - Project CrySTINA
Papers and information on the Cryptographically Secured Telecommunications Information Networking Architecture.
Ernst & Young LLP - Information Systems Assurance and Advisory Services
Report on e-cash.
Evaluation of Micropayment Schemes
HP tech report evaluating various micropayment schemes.
Finding the Key
Economic Strategy Institute study on crypto markets and policy.
Firewalls mailing list
Firewalls mailing list archives.
Foundations of Cryptography by Oded Goldreich
Fragments of a book (4 of 10 chapters exist).
Frog Encryption Algorithm
Design and source code for the Frog AES submission.
Getting Started With XML Security
XML security overview.
Great Crypto & Info Security Quotes
Various neat crypto and security-related quotes.
GSM Network Security
Description of GSM network security and encryption considerations.
Hack-Tic Magazine Archive
1989-1994 Hack-Tic magazine archive (scanned images, in Dutch).
Handbook of Applied Cryptography
Information on the book (well worth getting).
Heise News - Ticker
News ticker which often carries crypto and security-related stories (in German).
Historical Crypto Links
Links to sites containing information on Enigma, Purple, Magic, and other WWII-era crypto.
History of Computer Security
Computer security papers from the 1970's.
History of NSE Home Page
Prehistory of public-key crypto from GCHQ.
HNN - H a c k e r N e w s N e t w o r k
Security and hacking information, news, and software.
How to find security holes
Tutorial on finding (and fixing) Unix programming security holes.
How to optimize for the Pentium family of microprocessors
Useful guidelines for crypto algorithm implementation.
How to Write Secure Code
Links to information on writing secure code.
House of Commons - Trade and Industry - Seventh Report
UK DTI report on crypto policy.
HSC -- Herve Schauer Consultants
Reports and publications on security, crypto, security protocols and implementations.
HTTP Security group of W3C
W3C security resources.
IBM Patent Server Home Page
Access to over 2 million US patents, including many crypto and security-related ones
IDaSS designs: DES encription/decription device
DES ASIC designed as a student project.
IDEA Algorithm - Ascom Systec Ltd.
Information on the IDEA algorithm.
IDEA: A Cipher for Multimedia Architectures?
Paper on a fast MMX implementation of IDEA.
IEEE Computer Security and Privacy
IEEE Computer Society press online catalogue, security and privacy section.
ietf-open-pgp mailing list
PGP standardisation mailing list, RFC's, and archives.
ietf-pgp-mime mailing list
PGP/MIME RFC's and mailing list archives.
ietf-smime mailing list
S/MIME RFC's and mailing list archives.
Index of Crypto Papers Online
Bibliography of online crypto papers.
Info Security News
Information Security Glossary - The Information Security Policies Glossary
Glossary of information security terms and phrases.
Information Security Resources
Idaho State Uni security library.
Information Security Resources - Current Online Publications
Security standards and guidelines.
INFOSEC: Homepage
European Commission INFOSEC publication.
Integrity Sciences, Inc. SPEKE password authentication
Authenticated DH key exchange.
interhack publications
Various security-related publications: Firewalls, network security, Skipjack/KEA specs (more readable than the NSA originals).
Internet drafts
Current internet drafts, including many security-related ones (but you really need to know what you're looking for).
Internet Infrastructure Protection - DNS Security
DNS security RFC's and sample code.
Internet Legal Practice Newsletter
Internet-related legal issues (relevant to electronic commerce).
Internet Mail Security Alternatives
Paper exploring and comparing different versions of S/MIME and PGP.
Internet/Network Security - Welcome from The Mining Co.
Crypto/security-related news stories.
Introduction to Crypto Systems
Lecture slides from a seminar by Vinnie Moscaritolo.
Introduction to the Use of Encryption
Introductory overview to encryption systems.
Introduction to Cryptography
Ives Gobaus's easy introduction to cryptography.
ISOC: Conferences - NDSS
Network and Distributed System Security Symposium conference proceedings and info.
Java Security: Frequently Asked Questions
Java security questions and issues.
JIBC - Journal of Internet Banking and Commerce
Electronic commerce, legal issues, EDI, etc.
JILT: Home Page
Journal of Information Law and Technology.
Journal of Craptology Home Page
Crypto journal with papers the others won't print.
JYA Crypto
John Youngs collection of crypto links, mostly covering crypto social issues, laws, espionage, government regulation, and an amazing array of other interesting things.
Keyed MD5
Papers on HMAC's.
Keyserver Bibliothek
Publications on PGP, PGP keys, digital signatures, and crypto politics (most in German).
Kryptologie I - Material
Information and programs for breaking historical ciphers (monoalphabetic and polyalphabetics, transposition ciphers.
Largest Known Primes
Collection of large primes and primality-checking information.
Lawries Cryptography Bibliography
Searchable index of over 800 crypto and computer security articles.
Linux Security Home Page.
Linux security information.
LOKI97
The Loki97 block cipher (submitted for the AES).
Mac Crypto - Info
Mac-Crypto conferences and digests.
Mach5 Software Cryptography Archives
Overview of crypto, catalogue of crypto algorithms.
Maksim Otstavnov's HomeWall
Russian publications on encryption, digital finances, e-commerce.
Market Model - DBI Underwriting
A market model for digital bearer instrument underwriting.
Maximal Length LFSR Feedback Terms
Maxmimal length LFSR feedback polynomials.
Micropayments on the Internet
Overview of various micropayment schemes.
Microsoft CryptoAPI mailing list archives.
MISTY - Mitsubishi Electric's Encryption algorithm
Description of MISTY.
NameBase Book Index
Reviews of books on intelligence agencies, high-tech, military, and a potpourri of government agencies, drugs, elites, big business, organized crime, terrorism, US foreign policy, and so on.
NASA Technical Report Server (NTRS)
NASA tech reports search engine.
National Information Systems Security Conference Page
Information and proceedings from NISSC conferences from 1996 onwards.
NCSTRL Home Page
Networked Computer Science Technical Library, searchable technical report repository.
Netscape DevEdge Online
Netscape security-related documentation.
Network Computing
Various articles on encryption from Network Computing magazine.
Network Encryption - history and patents
Patents on network encryption.
Network-1 White Papers
Various white papers on firewall design.
New Book Series: Information Security and Cryptography
Springer-Verlag book series on crypto and security.
NewsNow NewsLink: Cryptography - updates every 5 minutes, 24/7
News updates on crypto-related stories.
New Zealand Digital Library
Bibliogaphy/tech report/FAQ searchable index.
Nicolas Tadeusz COURTOIS home page
HFE PKC. Patented :-(.
Non_secret_encryption
Newspaper article on early (spook) PKC development in the UK.
NSA to NARA OPENDOOR Bibliographic Index
Index of NSA declassified documents.
NSA/X31 Documents
NSA firewall-related documents and firewall performance tests.
NSAM-160
Scanned copy of declassified 1960's memo on NSA public-key encryption research.
NSA Cryptographic API 2nd Edition - 01 July 1996
NSA comments on various crypto API's.
NSG Publications
IBM Network Security Group publications.
NT Domain Authentication
NT/CIFS domain authentication specification.
NT Security - Frequently Asked Questions
NTRU Cryptosystems Home Page
Another new PKC.
On cryptosystems untrustworthiness
Interesting paper on security problems due to improperly implemented encryption systems.
On Distributed Communications: Security, Secrecy, and Tamper-free Considerations
1964 Rand Corporation report on cryptography and security.
On-The-Fly Encryption: A Comparison
Comparison of various disk/file encryption products.
OpenBSD Security
OpenBSD security advisories and information.
OSS ASN.1 Resources
ASN.1 whitepapers and resources (ASN.1 is used in various security standards).
Outlook Express Digital IDs & Encryptio