A curated list of cryptography papers, articles, tutorials and howtos.
Go to file
Nazar Serhiichuk 4541603671
Fix links and update lychee in CI (#51)
* readme: Fix Cryptanalysis of block ciphers

The link was already on web.archive. However, we need to pin to
exact date because the latest snapshot is for 404 page.

* Fix Cache Attacks and Countermeasures

Here we have eprint link so let's use it. It's fast, free and has
HTTPS support :)

* Fix On the Security of Public Key Protocols

Unfortunately, the link is not working anymore and there are no free
resources with this work. So, let's use web.archive

* Use https for How to construct zero-knowledge proof

Maybe it will help CI because as for now it fails with this link.

* ci: Update lychee version

* Fix A Method for Obtaining Digital Signatures

The previous link was used unsafe TLS features, so lychee was not
happy about it.
2024-03-04 15:44:17 +02:00
.github/workflows Fix links and update lychee in CI (#51) 2024-03-04 15:44:17 +02:00
CONTRIBUTING.md Update CONTRIBUTING.md 2017-10-26 19:32:55 +03:00
LICENSE.md Rename LICENSE.MD to LICENSE.md 2017-02-23 14:41:24 +02:00
README.md Fix links and update lychee in CI (#51) 2024-03-04 15:44:17 +02:00
awesome-felix-big.jpg figuring out pictures 2017-11-28 22:17:03 +02:00
awesome-felix-mascot.jpg resolution update 2017-11-28 22:11:30 +02:00

README.md

Awesome Crypto Papers Awesome

A curated list of cryptography papers, articles, tutorials and howtos for non-cryptographers.

Notes

The goal of this list is to provide educational reading material for different levels of cryptographic knowledge. I started it because my day job onboarding engineers at Cossack Labs includes educating them in cryptographic matters and giving advise what to read on specific topics, and that involves finding the same materials repeatedly. Hopefully, it will be useful for someone else as well.

It is aimed at people who are using cryptography in higher-level security systems to implement database encryption, secure sharing, end-to-end encryption in various schemes, and should understand how it works, how it fails and how it is attacked. It is not a list of notable / important / historically important papers (although many of them are here). It is not aimed at academics (who have better grasp of what they need anyway), nor it is aimed for systematic study of wanna-be cryptographers (who better follow structured approach under professional guidance).

It will be extended gradually as I find something of "must-have" value. Pull requests are very welcome.

Contents

The list

Introducing people to data security and cryptography

Simple: cryptography for non-engineers

Brief introductions

General cryptographic interest


Specific topics

Hashing

Secret key cryptography

Cryptanalysis

Public key cryptography: General and DLP

Public key cryptography: Elliptic-curve crypto

Zero Knowledge Proofs

Key Management

Math

  • PRIMES is in P - Unconditional deterministic polynomial-time algorithm that determines whether an input number is prime or composite.

Post-quantum cryptography


Books

That seems somewhat out of scope, isn't it? But these are books only fully available online for free. Read them as a sequence of papers if you will.


Lectures and educational courses


Online crypto challenges

Not exactly papers, but crypto challenges are awesome educational material.

License

CC0

To the extent possible under law, author has waived all copyright and related or neighboring rights to this work.