User:Stefanobalocco/Books/Cryptography

Usefull articles

 * Theory
 * Nothing up my sleeve number
 * Cryptographically secure pseudorandom number generator
 * Key derivation function
 * Block cipher
 * Trapdoor function
 * Diffie–Hellman problem
 * Optimal asymmetric encryption padding
 * Linear feedback shift register
 * Feistel cipher
 * Permutation cipher
 * Permutation box
 * Substitution cipher
 * Substitution–permutation network
 * S-box
 * Rijndael S-box
 * Rijndael key schedule


 * Irrational numbers
 * Pi
 * E (mathematical constant)
 * Golden ratio
 * Silver ratio
 * Plastic number
 * Square root of 2
 * Square root of 3
 * Square root of 5
 * Erdős–Borwein constant


 * Random number generators
 * Lagged Fibonacci generator
 * Mersenne twister
 * Well equidistributed long-period linear
 * Shrinking generator
 * Self-shrinking generator
 * ISAAC (cipher)


 * Prime numbers
 * Largest known prime number
 * Mersenne prime
 * Wieferich prime
 * Wagstaff prime
 * Solinas prime


 * Checksum & hash
 * Checksum
 * Hash-based message authentication code
 * Damm algorithm
 * Cyclic redundancy check
 * Fletcher's checksum
 * Adler-32
 * Fowler–Noll–Vo hash function
 * Zobrist hashing
 * Jenkins hash function
 * MurmurHash
 * CityHash
 * RIPEMD
 * Whirlpool (cryptography)
 * GOST (hash function)
 * Tiger (cryptography)
 * BLAKE (hash function)
 * Grøstl
 * JH (hash function)


 * Symmetrical
 * Skein (hash function)
 * Data Encryption Standard
 * DES supplementary material
 * DES-X
 * Triple DES
 * Blowfish (cipher)
 * Twofish
 * Threefish
 * RC2
 * RC4
 * RC5
 * Skipjack (cipher)
 * XXTEA
 * Serpent (cipher)
 * GOST (block cipher)
 * International Data Encryption Algorithm
 * Idea NXT
 * DFC (cipher)
 * Anubis (cipher)
 * KHAZAD
 * Camellia (cipher)
 * CAST-128
 * CAST-256
 * SEED
 * Salsa20
 * Advanced Encryption Standard


 * Asymmetrical
 * Primitive root modulo n
 * Discrete logarithm
 * Elliptic curve
 * Elliptic curve cryptography
 * Digital Signature Algorithm
 * RSA problem
 * Decisional Diffie–Hellman assumption
 * RSA (cryptosystem)
 * ElGamal encryption
 * Three-pass protocol
 * Station-to-Station protocol
 * Diffie–Hellman key exchange
 * Secure Remote Password protocol
 * Elliptic curve Diffie–Hellman
 * Elliptic Curve DSA
 * ElGamal signature scheme
 * Schnorr signature
 * SPEKE (cryptography)
 * MQV
 * Efficient Probabilistic Public-Key Encryption Scheme
 * Goldwasser–Micali cryptosystem
 * Blum–Goldwasser cryptosystem
 * Cramer–Shoup cryptosystem
 * Damgård–Jurik cryptosystem
 * CEILIDH
 * Rabin cryptosystem
 * Schmidt-Samoa cryptosystem
 * McEliece cryptosystem
 * Benaloh cryptosystem
 * Okamoto–Uchiyama cryptosystem
 * Paillier cryptosystem
 * Naccache–Stern cryptosystem