UsefulLinks
Computer Science
Cybersecurity
Cryptography
1. Foundations of Cryptography
2. Mathematical Foundations
3. Symmetric Key Cryptography
4. Asymmetric Key Cryptography
5. Cryptographic Hash Functions
6. Message Authentication and Integrity
7. Key Management and Distribution
8. Cryptanalysis and Security Analysis
9. Applied Cryptography and Security Protocols
10. Advanced Cryptographic Concepts
11. Cryptographic Standards and Compliance
11.
Cryptographic Standards and Compliance
11.1.
Cryptographic Standards Organizations
11.1.1.
National Institute of Standards and Technology
11.1.1.1.
FIPS Publications
11.1.1.2.
NIST Special Publications
11.1.1.3.
Cryptographic Algorithm Validation Program
11.1.2.
International Organization for Standardization
11.1.2.1.
ISO/IEC 18033 Series
11.1.2.2.
ISO/IEC 19790 and 19792
11.1.2.3.
Common Criteria
11.1.3.
Internet Engineering Task Force
11.1.3.1.
RFC Standards
11.1.3.2.
Cryptographic Protocols
11.1.3.3.
Security Considerations
11.1.4.
Institute of Electrical and Electronics Engineers
11.1.4.1.
IEEE 802.11 Security
11.1.4.2.
IEEE 1363 Standards
11.2.
Compliance Frameworks
11.2.1.
Federal Information Processing Standards
11.2.1.1.
FIPS 140-2 and FIPS 140-3
11.2.1.2.
Security Levels
11.2.1.3.
Testing Requirements
11.2.2.
Common Criteria
11.2.2.1.
Evaluation Assurance Levels
11.2.2.2.
Protection Profiles
11.2.2.3.
Security Targets
11.2.3.
Industry-Specific Requirements
11.2.3.1.
Payment Card Industry Standards
11.2.3.2.
Healthcare Regulations
11.2.3.3.
Financial Services Requirements
11.3.
Cryptographic Implementation Guidelines
11.3.1.
Secure Coding Practices
11.3.1.1.
Input Validation
11.3.1.2.
Error Handling
11.3.1.3.
Memory Management
11.3.2.
Key Management Standards
11.3.2.1.
Key Lifecycle Management
11.3.2.2.
Hardware Security Requirements
11.3.2.3.
Audit and Compliance
11.3.3.
Algorithm Selection Guidelines
11.3.3.1.
Approved Algorithms
11.3.3.2.
Key Size Recommendations
11.3.3.3.
Transition Timelines
Previous
10. Advanced Cryptographic Concepts
Go to top
Back to Start
1. Foundations of Cryptography