Useful Links
Computer Science
Cybersecurity
Cryptography
1. Foundations of Cryptography
2. Mathematical Foundations
3. Symmetric Key Cryptography
4. Asymmetric Key Cryptography
5. Cryptographic Hash Functions
6. Message Authentication and Integrity
7. Key Management and Distribution
8. Cryptanalysis and Security Analysis
9. Applied Cryptography and Security Protocols
10. Advanced Cryptographic Concepts
11. Cryptographic Standards and Compliance
Cryptographic Standards and Compliance
Cryptographic Standards Organizations
National Institute of Standards and Technology
FIPS Publications
NIST Special Publications
Cryptographic Algorithm Validation Program
International Organization for Standardization
ISO/IEC 18033 Series
ISO/IEC 19790 and 19792
Common Criteria
Internet Engineering Task Force
RFC Standards
Cryptographic Protocols
Security Considerations
Institute of Electrical and Electronics Engineers
IEEE 802.11 Security
IEEE 1363 Standards
Compliance Frameworks
Federal Information Processing Standards
FIPS 140-2 and FIPS 140-3
Security Levels
Testing Requirements
Common Criteria
Evaluation Assurance Levels
Protection Profiles
Security Targets
Industry-Specific Requirements
Payment Card Industry Standards
Healthcare Regulations
Financial Services Requirements
Cryptographic Implementation Guidelines
Secure Coding Practices
Input Validation
Error Handling
Memory Management
Key Management Standards
Key Lifecycle Management
Hardware Security Requirements
Audit and Compliance
Algorithm Selection Guidelines
Approved Algorithms
Key Size Recommendations
Transition Timelines
Previous
10. Advanced Cryptographic Concepts
Go to top
Back to Start
1. Foundations of Cryptography