Skip Navigation

Home Projects Publications Archives About Sign Up or Log In

Browse Resources

(4 classifications) (6 resources)

Data encryption (Computer science)

Classification
Handbooks, manuals, etc. (3)
Law and legislation. (1)
Software (4)
Standards. (5)

Resources
View Resource Cryptography

Cryptography is an ancient science, but, with the rise of the information age, computers have brought it to a whole new level. Online privacy and national security both depend on encryption, and maintaining a strong standard is more important than ever. The National Security Agency (NSA) maintains a fun and educational site for kids (1). Children can navigate through Cryptic Manor and solve...

https://scout.wisc.edu/report/nsdl/met/2002/0705
View Resource Copy Protection

With the recent shut down of the peer-to-peer file sharing utility Audiogalaxy, copy protection of all kinds of data is a very hot topic. Distribution of music, movies, and software is running rampant, and many believe the solution lies in better copy protection. To learn the basics of copy protection, visit Link Data Security (1). This company specializes in secure products that reduce piracy,...

https://scout.wisc.edu/report/nsdl/met/2002/0719
View Resource Cryptology ePrint Archive

The International Association for Cryptologic Research (IACR) maintains this archive of nearly 400 research papers on various topics in cryptology. Contents date back to 1996, and new material is posted most weeks. Papers generally describe original theories about a certain topic, analyses of cryptologic methods, or proofs of specific equations. Anyone can submit their research for possible...

https://eprint.iacr.org/
View Resource An Overview of Cryptography

Gary Kessler, a computer networking professor at Champlain College, is the author of this online introduction to cryptography. The material covers three main types of encryption and their applications, trust models, cryptographic algorithms, and much more. One of the most common areas that employs encryption techniques is the Internet, where it allows users to safely transmit private information...

https://www.garykessler.net/library/crypto.html
View Resource Cryptographic Toolkit

The Cryptographic Toolkit is being developed by a subgroup of the National Institute of Standards and Technology (NIST), whos members work to implement and promote cryptographic technologies and efficient practices. The purpose of the toolkit is to "enable US Government agencies and others to select cryptographic security components and functionality for protecting their data, communications, and...

http://csrc.nist.gov/groups/ST/toolkit/
View Resource Beyond Discovery: The Code War

This fascinating article explores the history and development of cryptography. Published in February 2003 by a division of the National Academy of Sciences, the article has substantial information on the applications of encryption in today's wired world. Additionally, it looks back at some of the most important breakthroughs related to number theory, spanning over two millennia. Some mildly...

http://www.nasonline.org/publications/beyond-discovery/the-c...