Usable Security Project
Western Illinois University
 
 
Welcome to Usable Security Education Project Home Page
  

Section 2: Basic Cryptography - Reference

Publications

  1. Complete reference to cryptography, Sha Goldwasser, Mihir Bellare, Cambridge, Massachusetts, Jul 2008.
  2. Cryptography and data security, ISBN, D. E. Denning, Addison-Wesley Publishing Company, Inc., 1982.
  3. New directions in Cryptography, Whitfield Diffie, Martin E. Hellman, IEEE Trans on Information Theory, Vol 22(6), Nov 1976.
  4. Why cryptosystems Fail?, Ross Anderson, 1st Conf. on Computer and Communication Security, ACM 1993.
  5. The Status of the P Versus NP Problem, Lance Fortnow, CACM, Sept 2009.
  6. Panel: Usable Cryptography: Manifest Destiny or Oxymoron?, Mary Ellen Zurko, Andrew S. Patrick, Financial Cryptography and Data Security Springer-Verlag Berlin, Heidelberg, 2008.

Links

  1. Introduction To Cryptography
  2. Nail the coffin shut, NTLM is dead
  3. Basic Concepts And Implementations Of Cryptography
  4. The Cryptography Introduction And Guide
  5. An Overview Of Cryptography, Gary C Kessler, Sep 2010.
  6. Basic Concepts In Data Encryption
  7. NIST Handbook on Cryptography
  8. List of tools for Data Security and Crypt Analysis

Top

 
 
 
 
Usable Security Education © 2008
Stipes 447I
Computer Science Department
Western Illinois University
1 University Circle
Macomb IL-61455
Western Illinois University Valid XHTML 1.0 Transitional Valid XHTML 1.0 Transitional National Science Foundation
 
 
 
 

This material is based upon work supported by the National Science Foundation under Grant No. 0736643. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.