[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

Cryptology Publications:

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 45
Thread images: 4

File: cryptology.jpg (279KB, 1293x796px) Image search: [Google]
cryptology.jpg
279KB, 1293x796px
Any recommendation on cryptology publications?
>>
>>8378264
Bump
>>
>>8378264
Yeah I have some.
>>
>>8378417
Titles and authors?
>>
>>8378442
Not of titles and authors, just cryptology publications.
>>
>>8378461
I was asking you for their: >>8378442
>>
>>8378463
What do you mean by that?
>>
>>8378472
/Sci/ really can be full of useless shitposters sometimes can't it, Fagnon?
>>
>>8378489
I agree. I especially hate people who pretend they're interested in learning something but can't even look up a textbook by themselves.
>>
>>8378515
>Implying I didn't.
>Implying the 4chan Science Wiki's cryptology list isn't anemic.
>Implying that knowledge from a knowledgable source isn't useful.
Fucking hell, you're dense.
>>
File: 1474791363405.png (1MB, 752x732px) Image search: [Google]
1474791363405.png
1MB, 752x732px
>>8378264
https://en.wikipedia.org/wiki/List_of_important_publications_in_cryptography

https://en.wikipedia.org/wiki/Al-Kindi

https://www.coursera.org/learn/crypto
>>
https://www.cisco.com/c/en/us/about/security-center/next-generation-cryptography.html

https://www.irs.gov/uac/encryption-requirements-of-irs-publication-1075

http://www.etsi.org/images/files/ETSIWhitePapers/QuantumSafeWhitepaper.pdf

https://cryptome.org/crypto-cb.htm

http://www.economist.com/news/international/21586296-be-safe-internet-needs-reliable-encryption-standards-software-and

https://engineering.stanford.edu/news/stanford-cryptography-pioneers-win-acm-2015-am-turing-award

http://www.alltekmarine.com/solution.php?nid=3

http://continuouswave.com/ubb/Forum6/HTML/003029.html

http://saab.com/globalassets/commercial/security/maritime-traffic-management-and-port-security-new-folder/traffic-management-solutions/stt---r5-supreme/w-ais/r5-secure-w-ais.pdf

https://aishealth.com/archive/rmc022315-03

https://www.linkedin.com/pulse/encryption-ai-myth-incompatibility-hamza-harkous?articleId=6149861821919612928

http://www.storagecraft.com/blog/5-common-encryption-algorithms/

http://www.emc.com/emc-plus/rsa-labs/standards-initiatives/public-key-cryptography-standards.htm

https://www.nist.gov/sites/default/files/documents/2016/09/23/accepted-papers-lwc2015.pdf

https://www.eff.org/deeplinks/2015/12/technical-crypto-2015-review
>>
>>8378627
>>8378645
Thank you for the useful posts.
>>
https://thehackernews.com/2016/07/hacking-android-encryption.html

http://www.akardam.net/moto/docs/mirrored/encryption.pdf

http://www.csc.villanova.edu/~tway/courses/csc3990/f2007/csrs2007/01-pp1-7-MattBlumenthal.pdf

http://www.aircrack-ng.org/doku.php?id=newbie_guide

http://aircrack-ng.org/doku.php?id=tutorial

https://www.nayuki.io/page/tiny-encryption-algorithm-in-x86-assembly

http://www.codeproject.com/Articles/264491/Huo-Encryption-Decryption-Assembly-Program

http://people.uncw.edu/ricanekk/teaching/fall09/csc242/labs/ASM3.pdf

https://stackoverflow.com/questions/22890000/assembly-encryption-decryption-program

http://www.codeproject.com/Articles/10154/NET-Encryption-Simplified

http://ww1.microchip.com/downloads/en/AppNotes/00953a.pdf

http://www.dreamincode.net/forums/topic/274916-x86-assembly-encryption-decryption/

https://ubuntuforums.org/showthread.php?t=528276

http://kalitoolsguide.com/cryptcat/

https://www.offensive-security.com/kali-linux/kali-encrypted-usb-persistence/

http://www.counton.org/explorer/codebreaking/frequency-analysis.php

http://www.cs.mtu.edu/~shene/NSF-4/Tutorial/VIG/Vig-Frequency-Analysis.html

http://crypto.interactive-maths.com/frequency-analysis-breaking-the-code.html

http://www.extremetech.com/extreme/173108-researchers-crack-the-worlds-toughest-encryption-by-listening-to-the-tiny-sounds-made-by-your-computers-cpu

http://arstechnica.com/security/2013/12/new-attack-steals-e-mail-decryption-keys-by-capturing-computer-sounds/

https://en.m.wikipedia.org/wiki/Van_Eck_phreaking

http://www.xpreeli.com/school/STSS2006_decrypt-English-text.pdf

https://www.safaribooksonline.com/library/view/kali-linux-wireless/9781783280414/ch04s09.html

http://www.econinfosec.org/archive/weis2010/papers/session1/weis2010_tucker.pdf
>>
https://securelist.com/blog/research/68750/equation-the-death-star-of-malware-galaxy/

http://hive.ccs.neu.edu/
https://veracrypt.codeplex.com/documentation

http://www.zdnet.com/article/cryogenically-frozen-ram-bypasses-all-disk-encryption-methods/

https://theintercept.com/2015/04/27/encrypting-laptop-like-mean/

http://www.zdnet.com/article/how-hackers-scrape-ram-to-circumvent-encryption/

http://www.howtogeek.com/141805/htg-explains-how-encryption-can-be-bypassed-with-a-freezer/

https://hackaday.com/2008/02/21/breaking-disk-encryption-with-ram-dumps/

https://www.scribd.com/doc/130070110/Extracting-Encryption-keys-from-RAM

https://www.cisco.com/c/en/us/td/docs/net_mgmt/vpn_solutions_center/2-0/ip_security/provisioning/guide/IPsecPG1.html

http://csrc.nist.gov/publications/nistpubs/800-77/sp800-77.pdf

http://www.digitaltrends.com/computing/mit-five-atom-quantum-rsa/

http://uncw.edu/phy/documents/SizemoreTalk.pdf

https://www.wired.com/2013/06/quantum-cryptography-hack/

https://www.wired.com/2013/06/quantum-cryptography-hack/

https://www.academia.edu/7534571/SUPERCOMPUTER_CAPABILITIES_-_INTERPRETING_ITS_ROLE_IN_DEFENCE
>>
http://www.rtl-sdr.com/receiving-decoding-decrypting-gsm-signals-rtl-sdr/

https://bgr.com/2015/08/25/nsa-encryption-quantum-computers/

http://arstechnica.com/tech-policy/2015/05/un-says-encryption-necessary-for-the-exercise-of-the-right-to-freedom/

https://www.sans.org/security-resources/policies/general/pdf/acceptable-encryption-policy

http://www.auditscripts.com/samples/encryption-policy.pdf

https://support.sas.com/documentation/cdl/en/lrcon/68089/HTML/default/viewer.htm#n1s7u3pd71rgunn1xuexedikq90f.htm

http://www.sascommunity.org/sugi/SUGI95/Sugi-95-67%20Ladan.pdf

http://www2.sas.com/proceedings/sugi22/POSTERS/PAPER248.PDF

https://en.wikipedia.org/wiki/Pirate_decryption

https://www.utmb.edu/InfoSec/Policies/PS/PS129_Encryption.pdf

http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf

http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

http://electronics.howstuffworks.com/satellite-tv5.htm

https://www.viasat.com/sites/default/files/legacy/web/datasheets/JIPM_datasheet_022_web.pdf

http://www.darkreading.com/risk-management/dont-trust-satellite-encryption-say-german-researchers/d/d-id/1102642

http://www.inmarsat.com/wp-content/uploads/2013/10/Inmarsat_Using_PSTN_Encryption_HC-2203_over_BGAN.pdf

http://www.klabs.org/mapld06/abstracts/1010_banu_a.html
https://www.yahoo.com/tech/watch-nsa-mit-quantum-computer-185145372.html

http://www.scmagazine.com/quantum-leap-the-impact-of-quantum-computing-on-encryption/article/459932/
>>
http://www.hughes.com/resources/hn9460-data-sheet

http://www.tiaonline.org/standards/technology/ciphs/documents/EMTEL_sec.pdf

https://www.pcisecuritystandards.org/documents/nb59Y8Qqv/P2PE_Hardware_Solution_%20Requirements_Initial_Release.pdf

http://www.telegraph.co.uk/technology/news/9058529/Satellite-phone-encryption-cracked.html

http://www.theregister.co.uk/2013/09/11/nist_denies_that_the_nsa_weakened_its_encryption_standard/

http://www.mathcs.emory.edu/~whalen/Hash/Hash_Articles/IEEE/A%20survey%20of%20encryption%20standards.pdf

https://www.wired.com/1994/08/satellite-3/

http://www.intelsat.com/wp-content/uploads/2012/12/IESS-208E.pdf

http://www.gps.gov/technical/ps/2008-SPS-performance-standard.pdf

http://www.dis.arkansas.gov/policiesStandards/Documents/comply_encryp_standard.pdf

https://eprint.iacr.org/2012/051.pdf

http://gsi.nist.gov/global/docs/sit/2014/LChenWed1.pdf

https://www.pcisecuritystandards.org/pdfs/pci_dss_glossary_v1-1.pdf


https://msdn.microsoft.com/en-us/library/bb510663.aspx

https://msdn.microsoft.com/en-us/library/bb934049.aspx

http://social.technet.microsoft.com/wiki/contents/articles/16086.implementing-transparent-data-encryption-tde-in-sql-server.aspx

http://www.cse.wustl.edu/~jain/cse567-06/ftp/encryption_perf/

http://www.brighthub.com/computing/smb-security/articles/75099.aspx
>>
>>8378664
>>8378675
>>8378684
>>8378695
That's quite the comprehensive post, thank you.
>>
File: wT4aXcn.jpg (166KB, 1920x1080px) Image search: [Google]
wT4aXcn.jpg
166KB, 1920x1080px
>>8378707
Anytime homie, learn all the things, and then give it away to a super AI and make it learn from your behaviors and have it do it a billion times faster than you before it even finishes learning/simulating this process.
>>
>>8378717
And then, it'll replace me?
>>
>>8378722
replace you if that becomes your job maybe, otherwise it'll just become the base layer/foundation for some sort of strange but inevitable economy/society based on information and digital identities.
>>
>>8378723
The future is scary.
>>
>>8378726
The inception of the Atom has shown humanity that has been our policies and duties that protect us and not our technologies. We must evolve as a social society if we are going to withstand and give credence to the exponentially growing sector of autonomous machinery .
>>
>>8378734
atom bomb
>>
>>8378734
That's true, though doesn't that limit humanity?
>>
>>8378742
in what way?
>>
>>8378264
guys,lets say that alice and bob wanna set public RSA keys and they select e=17. alice wants the modulus n to be of the form p! where p is a prime, and bob wants to make it of the form p^2 * q, where p and q are primes, whos choice is better and how should they choose their p and/or q values to make tehir RSA setup strong against factoring attacks?
>>
>>8378754
Alicia says hi.
>>
>>8378748
By enforcing extra laws to proscribe for newer and innovatie f technologies? For instance the atom bomb and unwarranted reluctancy toward nuclear power.
>>
>>8378781
in my opinion evolution is not just about enforcement but about interpretation and understanding. The first layer of the OSI layer model imo is the human layer. A lot of people fail to understand or to try to improve on that.
>>
I see a future similar to this: https://www.youtube.com/watch?v=K0-sR-CB570
>>
>>8378786
Well in my country, United Kingdom, they are implementing programming into primary and secondary education. I suppose that's a step forward?
>>
>>8378797
It should be a second language in my opinion. But that'll change, it'll be similar to learning cursive in my opinion. With the sophistication of AI learning, we could have far easier/more intuitive IDE's that could take in voice inputed slang/jargon and understand it. Kind of like Jarvis from Iron Man, without the fancy interface, although that interface has lots of potential as well.
>>
>>8378797
>>8378804
It's basically like taking steps forward on a treadmill while you're taking turns with your workout buddy on changing its power supply and RPM's.
>>
>>8378804
And now you're making me regret my educational and professional focus on nuclear engineering, though I do know: Matlab, C++; Lua, Python and LaTeX.
>>
>>8378816
You could use that knowledge to facilitate that outcome for public education/non-profit or for businesses. Aiming at the bulls-eye and hitting it are two different parts of the equation.
>>
You can also take it to the next lever and combine it with NLP's to create microprocessors that analyze different language and conversations and translate them for you verbally for international duologue involving security and/or different cultures/dialects.
>>
Possibly one way to get to that level is to first reach that intuitive IDE system, and have it backup/learn from its input and combine it on some sort of server for data/pattern analysis. Basically using one free/nonprofit idea for the more sophisticated idea. Have the IDE learn from the input it receives. Publish it for different languages, then combine the input from the various languages at some corporate hq and analyze it, and produce a microprocessor that can translate the variety of sounds and verify/compare it in the programming form.
>>
Using this idea: http://cis.usouthal.edu/%7Ehain/general/Publications/Voice%20Journal15.pdf

and creating classes/lessons based off of it for the everyday person, having it become improved continuously while an AI monitors it/learns from it.

Get to the point where jargon can be converted into code. Have a bunch of people program with jargon in different languages in classrooms all over the world. Study the code and the jargon at HQ and analyze it, create a microprocessor based on that analysis, use it to translate real-time conversations for info sec and international dialogue.
>>
>>8378856
Basically this could bypass the language conversion process by converting the inputed voice into code and then outputting it back in the desired language, but the amount of data received from a large sample group could allow for direct conversations. I guess what would vary would be the strength and the speed of the microchip and the amount of latency involved in each option. More than one company could manifest from this idea depending on which avenue of approach they'd like to take from it.
>>
>>8378889
You could also receive entire conversations in code and then input them back into the program whenever you'd like to have that conversation again, thus conserving data on some scale.
>>
>>8378901
If the processor did all of the work at the satellite stage rather than the towers, you wouldn't even need to distribute new devices, just new channels for data. Or you could put it in an App but that could hinder the security potential.
>>
I'm bumping this because I think this idea has a lot of potential.
>>
>>8378601
You'll never learn cryptography. I can tell.
>>
>>8378822
Good advice, anon.

>>8378842
>>8378851
>>8378856
>>8378889
>>8378901
>>8378907
That's sheer genius, anon.

>>8379019
Seconded.

>>8379110
>Run out of valid point, attempt to attack OP.
Impressive anon, your lack of creativity isn't surprising.
Thread posts: 45
Thread images: 4


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.