Cryptography Reference
In-Depth Information
How to Use It? Encryption code can be downloaded from a number
of places on the Net.
Further Reading
Applied Cryptography by Bruce Schneier is a good general
introduction to the subject. It includes good summaries of
the major algorithms. [Sch94]
Handbook of Applied Cryptography by Alfred J. Menezes,
Paul C. van Oorschot and Scott A. Vanstone is a good tech-
nical discussion of many of themost important algorithms
as well as their mathematical foundations. [MvV97]
The proceedings from the various conferences sponsored
by the International Association of Cryptologic Research
(IACR) offer some of the most timely insights into the best
open research in the field. See iacr.org .
It's impossible to summarize all of the hard work that cryp-
tographers have done to create linear approximations of
non-linear encryption functions. Adi Shamir did a good
job and extended the techniques developed by many oth-
ers in his talk given at Crypto 2008. He describes a sophis-
ticated algebraic technique that can be applied tomany of
the most common algorithms used today.[Sha08]
Search WWH ::




Custom Search