Cryptology Publications:

Any recommendation on cryptology publications?

Other urls found in this thread:

en.wikipedia.org/wiki/List_of_important_publications_in_cryptography
en.wikipedia.org/wiki/Al-Kindi
coursera.org/learn/crypto
cisco.com/c/en/us/about/security-center/next-generation-cryptography.html
irs.gov/uac/encryption-requirements-of-irs-publication-1075
etsi.org/images/files/ETSIWhitePapers/QuantumSafeWhitepaper.pdf
cryptome.org/crypto-cb.htm
economist.com/news/international/21586296-be-safe-internet-needs-reliable-encryption-standards-software-and
engineering.stanford.edu/news/stanford-cryptography-pioneers-win-acm-2015-am-turing-award
alltekmarine.com/solution.php?nid=3
continuouswave.com/ubb/Forum6/HTML/003029.html
saab.com/globalassets/commercial/security/maritime-traffic-management-and-port-security-new-folder/traffic-management-solutions/stt---r5-supreme/w-ais/r5-secure-w-ais.pdf
aishealth.com/archive/rmc022315-03
linkedin.com/pulse/encryption-ai-myth-incompatibility-hamza-harkous?articleId=6149861821919612928
storagecraft.com/blog/5-common-encryption-algorithms/
emc.com/emc-plus/rsa-labs/standards-initiatives/public-key-cryptography-standards.htm
nist.gov/sites/default/files/documents/2016/09/23/accepted-papers-lwc2015.pdf
eff.org/deeplinks/2015/12/technical-crypto-2015-review
thehackernews.com/2016/07/hacking-android-encryption.html
akardam.net/moto/docs/mirrored/encryption.pdf
csc.villanova.edu/~tway/courses/csc3990/f2007/csrs2007/01-pp1-7-MattBlumenthal.pdf
aircrack-ng.org/doku.php?id=newbie_guide
aircrack-ng.org/doku.php?id=tutorial
nayuki.io/page/tiny-encryption-algorithm-in-x86-assembly
codeproject.com/Articles/264491/Huo-Encryption-Decryption-Assembly-Program
people.uncw.edu/ricanekk/teaching/fall09/csc242/labs/ASM3.pdf
stackoverflow.com/questions/22890000/assembly-encryption-decryption-program
codeproject.com/Articles/10154/NET-Encryption-Simplified
ww1.microchip.com/downloads/en/AppNotes/00953a.pdf
dreamincode.net/forums/topic/274916-x86-assembly-encryption-decryption/
ubuntuforums.org/showthread.php?t=528276
kalitoolsguide.com/cryptcat/
offensive-security.com/kali-linux/kali-encrypted-usb-persistence/
counton.org/explorer/codebreaking/frequency-analysis.php
cs.mtu.edu/~shene/NSF-4/Tutorial/VIG/Vig-Frequency-Analysis.html
crypto.interactive-maths.com/frequency-analysis-breaking-the-code.html
extremetech.com/extreme/173108-researchers-crack-the-worlds-toughest-encryption-by-listening-to-the-tiny-sounds-made-by-your-computers-cpu
arstechnica.com/security/2013/12/new-attack-steals-e-mail-decryption-keys-by-capturing-computer-sounds/
en.m.wikipedia.org/wiki/Van_Eck_phreaking
xpreeli.com/school/STSS2006_decrypt-English-text.pdf
safaribooksonline.com/library/view/kali-linux-wireless/9781783280414/ch04s09.html
econinfosec.org/archive/weis2010/papers/session1/weis2010_tucker.pdf
securelist.com/blog/research/68750/equation-the-death-star-of-malware-galaxy/
hive.ccs.neu.edu/
veracrypt.codeplex.com/documentation
zdnet.com/article/cryogenically-frozen-ram-bypasses-all-disk-encryption-methods/
theintercept.com/2015/04/27/encrypting-laptop-like-mean/
zdnet.com/article/how-hackers-scrape-ram-to-circumvent-encryption/
howtogeek.com/141805/htg-explains-how-encryption-can-be-bypassed-with-a-freezer/
hackaday.com/2008/02/21/breaking-disk-encryption-with-ram-dumps/
scribd.com/doc/130070110/Extracting-Encryption-keys-from-RAM
cisco.com/c/en/us/td/docs/net_mgmt/vpn_solutions_center/2-0/ip_security/provisioning/guide/IPsecPG1.html
csrc.nist.gov/publications/nistpubs/800-77/sp800-77.pdf
digitaltrends.com/computing/mit-five-atom-quantum-rsa/
uncw.edu/phy/documents/SizemoreTalk.pdf
wired.com/2013/06/quantum-cryptography-hack/
academia.edu/7534571/SUPERCOMPUTER_CAPABILITIES_-_INTERPRETING_ITS_ROLE_IN_DEFENCE
rtl-sdr.com/receiving-decoding-decrypting-gsm-signals-rtl-sdr/
bgr.com/2015/08/25/nsa-encryption-quantum-computers/
arstechnica.com/tech-policy/2015/05/un-says-encryption-necessary-for-the-exercise-of-the-right-to-freedom/
sans.org/security-resources/policies/general/pdf/acceptable-encryption-policy
auditscripts.com/samples/encryption-policy.pdf
support.sas.com/documentation/cdl/en/lrcon/68089/HTML/default/viewer.htm#n1s7u3pd71rgunn1xuexedikq90f.htm
sascommunity.org/sugi/SUGI95/Sugi-95-67 Ladan.pdf
www2.sas.com/proceedings/sugi22/POSTERS/PAPER248.PDF
en.wikipedia.org/wiki/Pirate_decryption
utmb.edu/InfoSec/Policies/PS/PS129_Encryption.pdf
csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
csrc.nist.gov/publications/fips/fips197/fips-197.pdf
electronics.howstuffworks.com/satellite-tv5.htm
viasat.com/sites/default/files/legacy/web/datasheets/JIPM_datasheet_022_web.pdf
darkreading.com/risk-management/dont-trust-satellite-encryption-say-german-researchers/d/d-id/1102642
inmarsat.com/wp-content/uploads/2013/10/Inmarsat_Using_PSTN_Encryption_HC-2203_over_BGAN.pdf
klabs.org/mapld06/abstracts/1010_banu_a.html
yahoo.com/tech/watch-nsa-mit-quantum-computer-185145372.html
scmagazine.com/quantum-leap-the-impact-of-quantum-computing-on-encryption/article/459932/
hughes.com/resources/hn9460-data-sheet
tiaonline.org/standards/technology/ciphs/documents/EMTEL_sec.pdf
pcisecuritystandards.org/documents/nb59Y8Qqv/P2PE_Hardware_Solution_ Requirements_Initial_Release.pdf
telegraph.co.uk/technology/news/9058529/Satellite-phone-encryption-cracked.html
theregister.co.uk/2013/09/11/nist_denies_that_the_nsa_weakened_its_encryption_standard/
mathcs.emory.edu/~whalen/Hash/Hash_Articles/IEEE/A survey of encryption standards.pdf
wired.com/1994/08/satellite-3/
intelsat.com/wp-content/uploads/2012/12/IESS-208E.pdf
gps.gov/technical/ps/2008-SPS-performance-standard.pdf
dis.arkansas.gov/policiesStandards/Documents/comply_encryp_standard.pdf
eprint.iacr.org/2012/051.pdf
gsi.nist.gov/global/docs/sit/2014/LChenWed1.pdf
pcisecuritystandards.org/pdfs/pci_dss_glossary_v1-1.pdf
msdn.microsoft.com/en-us/library/bb510663.aspx
msdn.microsoft.com/en-us/library/bb934049.aspx
social.technet.microsoft.com/wiki/contents/articles/16086.implementing-transparent-data-encryption-tde-in-sql-server.aspx
cse.wustl.edu/~jain/cse567-06/ftp/encryption_perf/
brighthub.com/computing/smb-security/articles/75099.aspx
youtube.com/watch?v=K0-sR-CB570
cis.usouthal.edu/~hain/general/Publications/Voice Journal15.pdf
twitter.com/SFWRedditGifs

bump

Bump

Yeah I have some.

Titles and authors?

Not of titles and authors, just cryptology publications.

I was asking you for their:

What do you mean by that?

Veeky Forums really can be full of useless shitposters sometimes can't it, Fagnon?

I agree. I especially hate people who pretend they're interested in learning something but can't even look up a textbook by themselves.

>Implying I didn't.
>Implying the Veeky Forums Science Wiki's cryptology list isn't anemic.
>Implying that knowledge from a knowledgable source isn't useful.
Fucking hell, you're dense.

en.wikipedia.org/wiki/List_of_important_publications_in_cryptography

en.wikipedia.org/wiki/Al-Kindi

coursera.org/learn/crypto

cisco.com/c/en/us/about/security-center/next-generation-cryptography.html

irs.gov/uac/encryption-requirements-of-irs-publication-1075

etsi.org/images/files/ETSIWhitePapers/QuantumSafeWhitepaper.pdf

cryptome.org/crypto-cb.htm

economist.com/news/international/21586296-be-safe-internet-needs-reliable-encryption-standards-software-and

engineering.stanford.edu/news/stanford-cryptography-pioneers-win-acm-2015-am-turing-award

alltekmarine.com/solution.php?nid=3

continuouswave.com/ubb/Forum6/HTML/003029.html

saab.com/globalassets/commercial/security/maritime-traffic-management-and-port-security-new-folder/traffic-management-solutions/stt---r5-supreme/w-ais/r5-secure-w-ais.pdf

aishealth.com/archive/rmc022315-03

linkedin.com/pulse/encryption-ai-myth-incompatibility-hamza-harkous?articleId=6149861821919612928

storagecraft.com/blog/5-common-encryption-algorithms/

emc.com/emc-plus/rsa-labs/standards-initiatives/public-key-cryptography-standards.htm

nist.gov/sites/default/files/documents/2016/09/23/accepted-papers-lwc2015.pdf

eff.org/deeplinks/2015/12/technical-crypto-2015-review

Thank you for the useful posts.

thehackernews.com/2016/07/hacking-android-encryption.html

akardam.net/moto/docs/mirrored/encryption.pdf

csc.villanova.edu/~tway/courses/csc3990/f2007/csrs2007/01-pp1-7-MattBlumenthal.pdf

aircrack-ng.org/doku.php?id=newbie_guide

aircrack-ng.org/doku.php?id=tutorial

nayuki.io/page/tiny-encryption-algorithm-in-x86-assembly

codeproject.com/Articles/264491/Huo-Encryption-Decryption-Assembly-Program

people.uncw.edu/ricanekk/teaching/fall09/csc242/labs/ASM3.pdf

stackoverflow.com/questions/22890000/assembly-encryption-decryption-program

codeproject.com/Articles/10154/NET-Encryption-Simplified

ww1.microchip.com/downloads/en/AppNotes/00953a.pdf

dreamincode.net/forums/topic/274916-x86-assembly-encryption-decryption/

ubuntuforums.org/showthread.php?t=528276

kalitoolsguide.com/cryptcat/

offensive-security.com/kali-linux/kali-encrypted-usb-persistence/

counton.org/explorer/codebreaking/frequency-analysis.php

cs.mtu.edu/~shene/NSF-4/Tutorial/VIG/Vig-Frequency-Analysis.html

crypto.interactive-maths.com/frequency-analysis-breaking-the-code.html

extremetech.com/extreme/173108-researchers-crack-the-worlds-toughest-encryption-by-listening-to-the-tiny-sounds-made-by-your-computers-cpu

arstechnica.com/security/2013/12/new-attack-steals-e-mail-decryption-keys-by-capturing-computer-sounds/

en.m.wikipedia.org/wiki/Van_Eck_phreaking

xpreeli.com/school/STSS2006_decrypt-English-text.pdf

safaribooksonline.com/library/view/kali-linux-wireless/9781783280414/ch04s09.html

econinfosec.org/archive/weis2010/papers/session1/weis2010_tucker.pdf

securelist.com/blog/research/68750/equation-the-death-star-of-malware-galaxy/

hive.ccs.neu.edu/
veracrypt.codeplex.com/documentation

zdnet.com/article/cryogenically-frozen-ram-bypasses-all-disk-encryption-methods/

theintercept.com/2015/04/27/encrypting-laptop-like-mean/

zdnet.com/article/how-hackers-scrape-ram-to-circumvent-encryption/

howtogeek.com/141805/htg-explains-how-encryption-can-be-bypassed-with-a-freezer/

hackaday.com/2008/02/21/breaking-disk-encryption-with-ram-dumps/

scribd.com/doc/130070110/Extracting-Encryption-keys-from-RAM

cisco.com/c/en/us/td/docs/net_mgmt/vpn_solutions_center/2-0/ip_security/provisioning/guide/IPsecPG1.html

csrc.nist.gov/publications/nistpubs/800-77/sp800-77.pdf

digitaltrends.com/computing/mit-five-atom-quantum-rsa/

uncw.edu/phy/documents/SizemoreTalk.pdf

wired.com/2013/06/quantum-cryptography-hack/

wired.com/2013/06/quantum-cryptography-hack/

academia.edu/7534571/SUPERCOMPUTER_CAPABILITIES_-_INTERPRETING_ITS_ROLE_IN_DEFENCE

rtl-sdr.com/receiving-decoding-decrypting-gsm-signals-rtl-sdr/

bgr.com/2015/08/25/nsa-encryption-quantum-computers/

arstechnica.com/tech-policy/2015/05/un-says-encryption-necessary-for-the-exercise-of-the-right-to-freedom/

sans.org/security-resources/policies/general/pdf/acceptable-encryption-policy

auditscripts.com/samples/encryption-policy.pdf

support.sas.com/documentation/cdl/en/lrcon/68089/HTML/default/viewer.htm#n1s7u3pd71rgunn1xuexedikq90f.htm

sascommunity.org/sugi/SUGI95/Sugi-95-67 Ladan.pdf

www2.sas.com/proceedings/sugi22/POSTERS/PAPER248.PDF

en.wikipedia.org/wiki/Pirate_decryption

utmb.edu/InfoSec/Policies/PS/PS129_Encryption.pdf

csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf

csrc.nist.gov/publications/fips/fips197/fips-197.pdf

electronics.howstuffworks.com/satellite-tv5.htm

viasat.com/sites/default/files/legacy/web/datasheets/JIPM_datasheet_022_web.pdf

darkreading.com/risk-management/dont-trust-satellite-encryption-say-german-researchers/d/d-id/1102642

inmarsat.com/wp-content/uploads/2013/10/Inmarsat_Using_PSTN_Encryption_HC-2203_over_BGAN.pdf

klabs.org/mapld06/abstracts/1010_banu_a.html
yahoo.com/tech/watch-nsa-mit-quantum-computer-185145372.html

scmagazine.com/quantum-leap-the-impact-of-quantum-computing-on-encryption/article/459932/

hughes.com/resources/hn9460-data-sheet

tiaonline.org/standards/technology/ciphs/documents/EMTEL_sec.pdf

pcisecuritystandards.org/documents/nb59Y8Qqv/P2PE_Hardware_Solution_ Requirements_Initial_Release.pdf

telegraph.co.uk/technology/news/9058529/Satellite-phone-encryption-cracked.html

theregister.co.uk/2013/09/11/nist_denies_that_the_nsa_weakened_its_encryption_standard/

mathcs.emory.edu/~whalen/Hash/Hash_Articles/IEEE/A survey of encryption standards.pdf

wired.com/1994/08/satellite-3/

intelsat.com/wp-content/uploads/2012/12/IESS-208E.pdf

gps.gov/technical/ps/2008-SPS-performance-standard.pdf

dis.arkansas.gov/policiesStandards/Documents/comply_encryp_standard.pdf

eprint.iacr.org/2012/051.pdf

gsi.nist.gov/global/docs/sit/2014/LChenWed1.pdf

pcisecuritystandards.org/pdfs/pci_dss_glossary_v1-1.pdf


msdn.microsoft.com/en-us/library/bb510663.aspx

msdn.microsoft.com/en-us/library/bb934049.aspx

social.technet.microsoft.com/wiki/contents/articles/16086.implementing-transparent-data-encryption-tde-in-sql-server.aspx

cse.wustl.edu/~jain/cse567-06/ftp/encryption_perf/

brighthub.com/computing/smb-security/articles/75099.aspx

That's quite the comprehensive post, thank you.

Anytime homie, learn all the things, and then give it away to a super AI and make it learn from your behaviors and have it do it a billion times faster than you before it even finishes learning/simulating this process.

And then, it'll replace me?

replace you if that becomes your job maybe, otherwise it'll just become the base layer/foundation for some sort of strange but inevitable economy/society based on information and digital identities.

The future is scary.

The inception of the Atom has shown humanity that has been our policies and duties that protect us and not our technologies. We must evolve as a social society if we are going to withstand and give credence to the exponentially growing sector of autonomous machinery .

atom bomb

That's true, though doesn't that limit humanity?

in what way?

guys,lets say that alice and bob wanna set public RSA keys and they select e=17. alice wants the modulus n to be of the form p! where p is a prime, and bob wants to make it of the form p^2 * q, where p and q are primes, whos choice is better and how should they choose their p and/or q values to make tehir RSA setup strong against factoring attacks?

Alicia says hi.

By enforcing extra laws to proscribe for newer and innovatie f technologies? For instance the atom bomb and unwarranted reluctancy toward nuclear power.

in my opinion evolution is not just about enforcement but about interpretation and understanding. The first layer of the OSI layer model imo is the human layer. A lot of people fail to understand or to try to improve on that.

I see a future similar to this: youtube.com/watch?v=K0-sR-CB570

Well in my country, United Kingdom, they are implementing programming into primary and secondary education. I suppose that's a step forward?

It should be a second language in my opinion. But that'll change, it'll be similar to learning cursive in my opinion. With the sophistication of AI learning, we could have far easier/more intuitive IDE's that could take in voice inputed slang/jargon and understand it. Kind of like Jarvis from Iron Man, without the fancy interface, although that interface has lots of potential as well.

It's basically like taking steps forward on a treadmill while you're taking turns with your workout buddy on changing its power supply and RPM's.

And now you're making me regret my educational and professional focus on nuclear engineering, though I do know: Matlab, C++; Lua, Python and LaTeX.

You could use that knowledge to facilitate that outcome for public education/non-profit or for businesses. Aiming at the bulls-eye and hitting it are two different parts of the equation.

You can also take it to the next lever and combine it with NLP's to create microprocessors that analyze different language and conversations and translate them for you verbally for international duologue involving security and/or different cultures/dialects.

Possibly one way to get to that level is to first reach that intuitive IDE system, and have it backup/learn from its input and combine it on some sort of server for data/pattern analysis. Basically using one free/nonprofit idea for the more sophisticated idea. Have the IDE learn from the input it receives. Publish it for different languages, then combine the input from the various languages at some corporate hq and analyze it, and produce a microprocessor that can translate the variety of sounds and verify/compare it in the programming form.

Using this idea: cis.usouthal.edu/~hain/general/Publications/Voice Journal15.pdf

and creating classes/lessons based off of it for the everyday person, having it become improved continuously while an AI monitors it/learns from it.

Get to the point where jargon can be converted into code. Have a bunch of people program with jargon in different languages in classrooms all over the world. Study the code and the jargon at HQ and analyze it, create a microprocessor based on that analysis, use it to translate real-time conversations for info sec and international dialogue.

Basically this could bypass the language conversion process by converting the inputed voice into code and then outputting it back in the desired language, but the amount of data received from a large sample group could allow for direct conversations. I guess what would vary would be the strength and the speed of the microchip and the amount of latency involved in each option. More than one company could manifest from this idea depending on which avenue of approach they'd like to take from it.

You could also receive entire conversations in code and then input them back into the program whenever you'd like to have that conversation again, thus conserving data on some scale.

If the processor did all of the work at the satellite stage rather than the towers, you wouldn't even need to distribute new devices, just new channels for data. Or you could put it in an App but that could hinder the security potential.

I'm bumping this because I think this idea has a lot of potential.

You'll never learn cryptography. I can tell.

Good advice, user.

That's sheer genius, user.

Seconded.

>Run out of valid point, attempt to attack OP.
Impressive user, your lack of creativity isn't surprising.