Cryptography
- Cryptographic Right Answers
- Too much crypto
- Cryptanalysis Cheatsheet :: Notes from Overthewire Krypton
- Why AES-GCM Sucks
- Padding Oracles: An Animated Primer
- The Joy of Cryptography is a textbook for an undergraduate course in cryptography.
- New Directions in Cryptography WHITFIELD DIFFIE AND MARTIN E. HELLMAN
- Constructing a sponge function from MD5
RNG
- Discussion on hacker news about
/dev/random
going out of randomness and its non-senseness - Myths about /dev/urandom
- Cracking RNGs: Linear Congruential Generators
- random.c Inside the Linux kernel RNG
Digital signatures
Hash functions
PBKDF
AKE
- An Introduction to Authenticated Key Exchange Protocols (slides)
Vulnerability
Attacks
- Sybil attack the attacker subverts the reputation system of a peer-to-peer network by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence
TLS/SSL
Links
- cryptopals We've built a collection of 48 exercises that demonstrate attacks on real-world crypto.