Curated list of awesome lists
Awesome Crypto Papers
A curated list of cryptography papers, articles, tutorials and howtos for non-cryptographers.
The goal of this list is to provide educational reading material for different levels of cryptographic knowledge. I started it because my day job onboarding engineers at Cossack Labs includes educating them in cryptographic matters and giving advise what to read on specific topics, and that involves finding the same materials repeatedly. Hopefully, it will be useful for someone else as well.
It is aimed at people who are using cryptography in higher-level security systems to implement database encryption, secure sharing, end-to-end encryption in various schemes, and should understand how it works, how it fails and how it is attacked. It is not a list of notable / important / historically important papers (although many of them are here). It is not aimed at academics (who have better grasp of what they need anyway), nor it is aimed for systematic study of wanna-be cryptographers (who better follow structured approach under professional guidance).
It will be extended gradually as I find something of "must-have" value. Pull requests are very welcome.
Introducing people to data security and cryptography
Simple: cryptography for non-engineers
General cryptographic interest
Secret key cryptography
FIPS 197 - AES FIPS document.
List of proposed operation modes of AES - Maintained by NIST.
Recomendation for Block Cipher modes of operation: Methods and Techniques.
Stick figure guide to AES - If stuff above was a bit hard or you're looking for a good laugh.
Cache timing attacks on AES - Example of designing great practical attack on cipher implementation, by Daniel J. Bernstein.
Cache Attacks and Countermeasures: the Case of AES - Side channel attacks on AES, another view, by Dag Arne Osvik, Adi Shamir and Eran Tromer.
Salsa20 family of stream ciphers - Broad explanation of Salsa20 security cipher by Daniel J. Bernstein.
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba - Analysis of Salsa20 family of ciphers, by Jean-Philippe Aumasson et al.
ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS) - IETF Draft of ciphersuite family, by Adam Langley et al.
AES submission document on Rijndael - Original Rijndael proposal by Joan Daemen and Vincent Rijmen.
Ongoing Research Areas in Symmetric Cryptography - Overview of ongoing research in secret key crypto and hashes by ECRYPT Network of Excellence in Cryptology.
The Galois/Counter Mode of Operation (GCM)
- Original paper introducing GCM, by by David A. McGrew and John Viega.
The Security and Performance of the
Galois/Counter Mode (GCM) of Operation - Design, analysis and security of GCM, and, more specifically, AES GCM mode, by David A. McGrew and John Viega.
Public key cryptography: General and DLP
Public key cryptography: Elliptic-curve crypto
Zero Knowledge Proofs
PRIMES is in P - Unconditional deterministic polynomial-time algorithm that determines whether an input number is prime or composite.
That seems somewhat out of scope, isn't it? But these are books only fully available online for free. Read them as a sequence of papers if you will.
Lectures and educational courses
Online crypto challenges
Not exactly papers, but crypto challenges are awesome educational material.
To the extent possible under law, author has waived all copyright and related or neighboring rights to this work.