Questions tagged [reference-request]

A reference request is a request to be provided with a source from documentation, official papers, and specs related to one or more specific algorithms or cryptographic procedures. Open ended literature recommendation requests are off topic! Also: Crypto.SE is not an optimal replacement for a search engine. The reference-request tag is not something that provides a base to replace research efforts.

A reference request is a request to be provided with a source from documentation, official papers, and specs related to one or more specific algorithms or cryptographic procedures, to provide a trusted base for what's being said or written.

Open ended literature recommendation are off topic! For details, see: Do we want “literature recommendations” and similar “list/subjective questions”?

For example:

  • "Where are NIST's key length recommendations for RSA defined" would be an on-topic reference request;
  • "What should I read to learn about X" would be off-topic.

Also note that Crypto.SE is not an optimal replacement for a search engine. A reference request is a request to be provided with a trusted base for what's being said or written in a question or answer. It is not something that provides a base to replace research efforts.

414 questions
18
votes
2 answers

Is Bruce Schneier Applied Cryptography, Second ed. up to date?

I like Applied Cryptography, and I am returning to cryptography after a while. So I am wondering if that book is up to date or can be complemented with other references. I am looking for a book, authoritative, well documented. Possibly including…
user7338039
  • 191
  • 6
10
votes
2 answers

Why cannot I assume that cryptography published in venues/journals handled by the same publishers as prestigious journals is serious?

I do not know if it is allowed to ask this question. I have been told that "most of the papers on chaos-based cryptography are appearing in fee/generalist journals, whose focus is not security" However, I found that journals like Springer and…
Crypt01
  • 417
  • 3
  • 10
4
votes
1 answer

Cryptography resources for programmers

As a senior programmer entering blockchain projects, i'm looking for a comprehensive introduction to relevant cryptographic tools/primitives, preferably one that puts less emphasis on the math and more on the usage. Are there recommended resources…
4
votes
1 answer

What is the cryptography job market like these days?

The security field seems to have jobs aplenty, but what about cryptography specifically? Is the field ridiculously difficult to break into, even with a relevant degree, or are industry/government/academia recruiting as heavily as industry is of…
user124384
  • 189
  • 5
2
votes
1 answer

What is Standard Referencing of Cryptography Papers

I am writing a paper. One of my references is 1)Barreto, P. and Rijmen, V., “The Khazad Legacy-Level Block Cipher,” Submission to the NESSIE Project, vol. 97, 2004. My professor criticize me that why I wrote submission to the NESSIE…
user0410
  • 253
  • 3
  • 13
2
votes
2 answers

What are good sources for properly learning cryptography for a mathematician?

I'm a pure mathematics student(currently in a Msc program) looking to get into cryptography. I imagine most "regular" introductory books on cryptography would avoid being too heavy on mathematical details due to the target audience. So I'd like to…
user1633011
  • 129
  • 3
2
votes
0 answers

RC6-like key schedule with 16-bit S-boxes

I am trying to figure out an encryption algorithm whose key schedule function seems to be similar to RC6. However, it seems to be creating S-Boxes using 16-bit integers instead of 32-bit ones. I have posted some pseudocode below which is filling the…
Prixar
  • 21
  • 1
2
votes
2 answers

Use of Lamport's Signature as a primitive

Is Lamport's One Time Signature used as a primitive to construct any other cryptographic protocols?
Subhayan
  • 428
  • 3
  • 11
1
vote
1 answer

looking for BKZ earliest algorithm and its application in cryptography

I am reading lattice based cryptography for my master thesis, I am looking for the earliest version of BKZ algorithm, and its applications in cryptography, to understand it very well, I already know about LLL algorithm. and thanks in advance
Don Freecs
  • 453
  • 3
  • 14
1
vote
1 answer

What are the major differences between theoretical cryptography and applied (practical) cryptography?

There are a lot of theoreticians who don´t have a clue of the applied aspects involving cryptography. Are the two disciplines mutually exclusive? Can you learn one without the other?
user38472
  • 11
  • 1
1
vote
0 answers

References and Books for the basics

I started studying again recently, I forgot plenty of stuff. But there are 2 areas that I am really struggling. The procedures to prove and demonstrate theorems. The basic math necessary for cryptography. Do you guys have any books and references…
0
votes
1 answer

Argument of Knowledge - Definition

I've recently understood the difference between Interactive Proofs and Arguments, but even if several standard variations of IP are well known and thoroughly described in textbooks (Goldreich for instance) Arguments are not so well documented. In…
JayTuma
  • 71
  • 7
0
votes
1 answer

Understanding Cryptography practically

I have just undergone a one semester course in cryptography. I was introduced to multiple theoretical aspects, the way several algorithms work, the methods and their stability and so on. Due to time constraint, not much of problem solving was done.…
user17279
0
votes
0 answers

Looking for crypto with derived keys?

I am looking for cryptographic algorithm or combination of them. Basically I need an algorithm, which can generate private key and for this key can be computed multiple keys based on some seed. So a different seed would generate a different line of…
Daniel
  • 9
  • 2
-1
votes
1 answer

Cryptography based upon neural networks

I would like learn about use neural networks in cryptography. Is there any research literature on this subject? What should I do to learn about the subject? I am taking short course in neural networks and for the course project I would like to do…
Jager
  • 11
  • 1