DAMN Resources |
---|
Programs' crypto parameters list contains information about public-key crypto algorithms and parameters used in shareware programs. |
Elliptic Curve Cryptography |
---|
ANSI X9.62-1998 (Working Draft) The Elliptic Curve Digital Signature Algorithm (ECDSA)© (PDF, 743Kb) |
ANSI X9.63-199x (Working Draft) Key Agreement and Key Transport Using Elliptic Curve Cryptography (PDF, 820Kb) |
The Elliptic Curve Digital Signature Algorithm (ECDSA) by Don Johnson and Alfred Menezes (PDF, 478Kb) |
Faster Attacks on Elliptic Curve Cryptosystems by Michael J. Wiener and Robert J. Zuccherato (PDF, 210Kb) |
Other Docs |
---|
Descriptions of SHA-256, SHA-384, and SHA-512 (PDF, 262Kb) |
May 30, 2001 Draft FIPS 180-2 (Secure Hash Standard) (PDF, 292Kb) |
Links |
---|
Handbook of Applied Cryptography (HAC). Excellent book by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone. PDF version is available for free download. |
Underground Security Systems Research has a HUGE cryptography related archive (go to 'Cryptography' section on their site). |
An extensive list of crypto related publications |
List of CWI's (National Research Institute for Mathematics and Computer Science in the Netherlands) reports of project "Computational number theory and data security" |