| DAMN Resources |
|---|
| Programs' crypto parameters list contains information about public-key crypto algorithms and parameters used in shareware programs. |
| Elliptic Curve Cryptography |
|---|
| ANSI X9.62-1998 (Working Draft) The Elliptic Curve Digital Signature Algorithm (ECDSA)© (PDF, 743Kb) |
| ANSI X9.63-199x (Working Draft) Key Agreement and Key Transport Using Elliptic Curve Cryptography (PDF, 820Kb) |
| The Elliptic Curve Digital Signature Algorithm (ECDSA) by Don Johnson and Alfred Menezes (PDF, 478Kb) |
| Faster Attacks on Elliptic Curve Cryptosystems by Michael J. Wiener and Robert J. Zuccherato (PDF, 210Kb) |
| Other Docs |
|---|
| Descriptions of SHA-256, SHA-384, and SHA-512 (PDF, 262Kb) |
| May 30, 2001 Draft FIPS 180-2 (Secure Hash Standard) (PDF, 292Kb) |
| Links |
|---|
| Handbook of Applied Cryptography (HAC). Excellent book by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone. PDF version is available for free download. |
| Underground Security Systems Research has a HUGE cryptography related archive (go to 'Cryptography' section on their site). |
| An extensive list of crypto related publications |
| List of CWI's (National Research Institute for Mathematics and Computer Science in the Netherlands) reports of project "Computational number theory and data security" |