Useful Cryptography Resources

This page is an attempt to compile some of the top technical crypto and security blogs, textbooks, and websites. It’s very much a work in progress. If you think something is missing, please leave a note in comments or drop me a line.

Top Cryptography and Security Blogs

Schneier on security. One of the oldest and most famous security blogs. Bruce covers topics from block cipher cryptanalysis to airport security.

Root Labs rdist. Nate Lawson and his co-authors write on a variety of topics including hardware implementation, cryptographic timing attacks, DRM, and the Commodore 64.

Bristol Cryptography Blog. The official blog for the University of Bristol cryptography research group. It’s a group blog, primarily targeted towards cryptographers and crypto students.

Travis Goodspeed. Travis does interesting things to hardware and lives to tell. He’s a great read if you’re interested in hardware security, wireless hacking, or anything in between. 

Matasano Chargen. Unfortunately Chargen doesn’t seem to get updated anymore, but in its day it was a great resource for software and crypto exploits. You can still browse the archives.

Light Blue Touch Paper (University of Cambridge). Group blog from the University of Cambridge. Topics vary, but whatever these folks say is worth paying attention to.

Bunnie’s blog. Notes from one of the preeminent hardware hackers, the guy who first hacked the XBox and ran the first MITM attack on HDCP.

Good Enough Security. David Wachtfogel’s blog covers a whole bunch of topics, including a nice recent series entitled ‘sub-standard security’ (which really should be a blog of its own).

MPC Lounge Blog. Excellent wonky blog by researchers in the area of secure multiparty computation. Topics include fully homomorphic encryption, secure function evaluation and more.

Cryptography and Security Textbooks

The Handbook of Applied Cryptography (aka the HAC), by Menezes, van Oorschot and Vanstone. One of the fundamental textbooks in this area. Covers basic theory, symmetric and asymmetric cryptography, and protocols. This is not a quick read, mind you. It’s a serious textbook and an excellent reference. (The full text can be downloaded for free, but it’s worth purchasing.)

Security Engineering by Ross Anderson. If you’re designing or analyzing security systems and haven’t read this book, you need to do so immediately. Anderson is a cryptographer, security expert and all-around savant. (The full 2001 edition can be downloaded for free, but the 2008 edition is even better.)

Modern Cryptography by Wenbo Mao. An excellent introductory crypto textbook, a little bit less dense than the HAC. (Not available online.)

Introduction to Modern Cryptography by Jonathan Katz and Yehuda Lindell. We use this as a core text at Hopkins. A fantastic mix of practical and theoretical crypto. (Only one chapter is online.)

Foundations of Cryptography by Oded Goldreich. This two-book pair is probably the best cryptographic theory textbook. This is a great book to start with if you’re looking to understand the formal underpinnings first. But it’s not an applied crypto textbook. (A few draft chapters are available here, but you’ll have to purchase the rest.)

Online courses and lecture notes

Stanford’s online cryptography course, instructor: Dan Boneh. While this course has never been offered before (it starts 1/23/2012) it’s taught by Dan Boneh. If you’re looking for a strong online course, this is the one. (Notes, assignments and video lectures.)

Stanford & Berkeley’s online security course, instructors: Dan Boneh, Dawn Song and John Mitchell. Everything I just said about Stanford’s crypto course, but with more attitude and less crypto. Starts 2/2012. (Notes, assignments and video lectures.)

Mihir Bellare and Shafi Goldwasser’s Lecture Notes. A full set of notes (really a mini-book) for a short course offered at MIT. 

Introduction to Modern Cryptography, instructor: Philip Rogaway, UCSD. Along with Mihir Bellare, Rogaway is one of the inventors of the field of ‘Practice-oriented provable security’. (Notes and slides.)

Computer Security 161, instructor: Vern Paxson, UC Berkeley. This is Berkeley’s intro to computer security course. Covers fundamentals like threat modeling, crypto, worms, and all the rest of it. (Notes, slides and assignments). 

Practical Cryptographic Systems, instructor: Matt Green, Johns Hopkins. This is a practical systems/crypto course I teach from time to time at Johns Hopkins. While it’s hardly in the same league as the courses I’ve listed above, hey, it’s my blog. Moreover, this is one of the few that focuses on practical crypto attacks and vulnerabilities. (Slides and assignments.) 

Practical Aspects of Cryptography, instructors: Josh Benaloh and Brian LaMacchia, University of Washington & MSR. Also looks like an excellent introduction to the practical aspects of cryptography. (Slides and assignments.)

Useful websites

The IACR ePrint Archive. Hosted by the International Association of Cryptologic Research, this e-print archive hosts most of the latest academic crypto results.

Crypto StackExchange. Excellent community-oriented crypto Q&A site.

WTFCrypto. Short answers to common questions. 

Software

OpenSSL, NSS, GnuTLS, Crypto++, BouncyCastle, Pycrypto. Just a few of the standard crypto libraries used to secure data on the Internet.

The Advanced Crypto Software Collection at UT Austin. Implementations of advanced crypto schemes such as Attribute-Based Encryption, Paillier, and other interesting protocols.

NaCl. A new cryptographic library from the CACE project. 

Charm at Johns Hopkins. A Python-based framework for rapidly prototyping ‘research’ cryptosystems. Provides underlying support for common settings, including ECC and Pairing-based Cryptography. Implementations of many research cryptosystems.

Top Cryptography and Security Conferences

CRYPTO, EurocryptAsiacryptTCC (for theoretical cryptography), PKC, RSA-CTCHES (hardware and embedded), FSE (software encryption). A few of the better cryptography conferences, but hardly the only ones.

IEEE Security and Privacy Symposium (aka ‘Oakland’), Usenix Security, ACM CCS. A few of the top security conferences. Note that all links are for 2012.

11 thoughts on “Useful Cryptography Resources

  1. Thanks for creating the list, and thanks for including Cryptography Stack Exchange in it (I'm a moderator there). We sometimes get questions for resources, which are not a good fit for the Stack Exchange format, and it looks like we now can simply link to your list.

  2. To the crypto textbook section, I would add Katz and Lindell's Introduction to Modern Cryptography. I used it in a 1-semester crypto theory class, and it is an excellent book for learning and reference.

  3. I really enjoy simply reading all of your weblogs. Simply wanted to inform you that you have people like me who appreciate your work. Definitely a great post. Hats off to you! The information that you have provided is very helpful.
    agen bola

  4. I was delighted to find this web site.I wanted to thank you for your time reading this wonderful! I really enjoyed every bit of it and I've marked to ensure that the blog post something new.
    Jasa SEO

Comments are closed.