Cryptology pointers

Starting points Literature
Newsgroups Blogs FAQs Introductions to Crypto Collections of links Bibliographies Books Journals Lecture Notes
Conferences, Workshops, Seminars Groups and individuals working on crypto
2009 2010 Seminars, Courses... Style files & help for authors Universities Industr. Research Groups Cryptographers Organizations Companies Research and Education
Basic Symmetric Primitives Advanced Symmetric Primitives & Cryptosystems
Block ciphers (AES) Stream ciphers Hash functions Hand Ciphers Block Cipher Modes MACs Pseudorandom Functions Boolean functions
Public-Key Cryptography PKC Based on Some Special Mathematical Structures
Public-Key Encryption Theory of PKC Threshold Encryption Braid Groups Elliptic Curves Pairings Multilinear Maps Class Groups Lattice Based Crypto & Lattice Reduction
Signature schemes Other public-key primitives
Undeniable Signatures Group Signatures Trapdoor Signatures Commitment Pseudorandom Generators
Authentication, Identification and Key Exchange protocols
Identification Schemes Password-Authenticated Key Exchange Zero-Knowledge Proofs of knowledge Mixnets/Shuffles
Cryptographic Protocols Protocols on large data-sets
E-Cash E-Auctions Traitor Tracing/Broacast Encryption Electronic Voting Fair Exchange Oblivious Transfer and Private Information Retrieval Private Search Privacy-Preserving Data mining
Infrastructure Protocols Practical Aspects
Time-Stamping Public Key Infrastructure Countermeasures to DoS Implementations Software Hardware Mobile Devices Smartcards Internet Cryptography Standards Law Patents
Secure Computation & Foundations Formal Methods, Various Security Models
Two-Party Computations Multi-Party Computations Secret Sharing Security in Malicious Model Information-Theoretic Cryptography Random Oracle Model Generic Group Model Authentication Logic Universal Composability Leakage Impossibility Results
Related Areas in Security Related Areas in General
Steganography/Watermarking/Obfuscation Biometrics Data Compression Coding Theory Communication Complexity Branching Programs Data Structures Number Theory (Primality tests) Quantum Computation and Cryptography Game Theory
Miscellaneous Information
History Regional Sites Entertainment Unsorted links (Everything else)

About this page

More than 6000 links on cryptology (i.e., cryptography and cryptanalysis) and chosen areas of data security plus links to information on more than 800 cryptographers; total number of links thus exceeds 7000! Maintained by Helger Lipmaa, <helger.lipmaa><at> Any comments and additions are welcome. for