CS294-3: Algorithms in the Real World (Guy Blelloch, Fall 97)
Topic 2: Cryptography
[ Topics |
Scribe Notes |
Readings |
Text Books |
Links ]
(*) topics will only be covered briefly
Cryptography 1 (draft) (Tzu-Yi Chen)
Cryptography 2 (draft) (David Oppenheimer)
Cryptography 3 (draft) (Marat Boshernitsan)
Introduction to Cryptography.
A good online intro with several useful links.
Bruce Schneier,
Applied Cryptography
, Wiley, 1996.
Chapter 19 (Public Key Algorithms)
Chapter 24 (Example Implementations)
Primary
Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone.
Handbook of Applied
Cryptography.
CRC Press, 1996.
Several of the chapters are available for free off of the web page.
Bruce Schneier,
Applied Cryptography
,
Wiley, 1996.
Jennifer Seberry and Josed Pieprzyk.
Cryptography: An Introduction to Computer Security
Prentice-Hall, 1989.
Douglas R. Stinson.
Cryptography: Theory and Practice.
CRC Press, 1995.
William Stallings
Cryptography and Network Security : Principles and Practice
Prentice-Hall, 1998.
Other
G. Brassard, Modern Cryptology: a tutorial. Spinger-Verlag, 1988.
N. Koblitz, A course in number theory and cryptography.
Springer-Verlag, 1987.
C. Pfleeger, Security in Computing. Prentice-Hall, 1989.
A. Saloma, Public-key cryptography. Springer-Verlag, 1990.
D. Welsh, Codes and Cryptography. Claredon Press, 1988.
General links
Ron Rivest's Cryptography and Security Page. Great list of
commercial enterprises.
Bruce Schneier's Crypto Links
The International Cryptography page.
Quadralay's
Cryptography Archive
Cryptography: The Study of Encryption (another archive).
Cryptography FAQ (from sci.crypt)
Cryptography FAQ (from RSA Data Security, Inc. ).
Another list ofCompanies.
Survery articles
T. Beth.
Algorithm engineering for public key algorithms.
IEEE Selected Areas of Communication, 1(4), 458--466, 1990.
E. F. Brickell and A. M. Odlyzko.
Cryptanalysis: A survey of Recent Results.
Proceedings of the IEEE, 76(5), 578--593, 1988.
W. Diffie.
The first ten years of public key cryptography.
IEEE proceedings, 76(5), 560--577, 1988.
J. Massey.
An introduction to contemporary cryptology.
IEEE proceedings, 76(5), 533--549, 1988.
Simmons (ed.).
Contemporary Cryptology: the Science of Information Integrity.
IEEE press, 1991.
R. L. Rivest.
"Cryptology" in Handbook of Theoretical Computer Science, vol. A:
Algorithms and Complexity, Elsevier and MIT Press (1990), 717-756.
Digital cash.
Millicent page.
List of
propose protocols.
DES and other Block Ciphers.
Bruce Schneier,
Applied Cryptography,
Wiley, 1995.
Chapter 12, 13 and 14.
The Block Cipher
Lounge lists the performance and weaknesses of various block
ciphers.
KERBEROS.
J. T. Kohl.
The evolution of the KERBEROS authentication service.
(abstract).
Key Escrow Systems
A taxonomy and list of key escrow encryption systems.
The Politics of Encryption
What's HOT in Encryption
Back to the Algorithms in the Real World home page.
Guy Blelloch,
guyb@cs.berkeley.edu.