Welcome to my library, I'm storing nice reading and papers I had to used for my project
Serious Cryptography a Practical: Introduction to Modern Encryption
Interesting book for beginner in cryptography. Talk about classic, modern and quantum cryptography with
example of application in python or golang. Every thing is pretty easy to understand and it give you a
really good overview of cryptography
Author: Jean-Philippe Aumasson - 2018.
Mathematics of Public Key Cryptography
This book gives a rigorous presentation of most of the mathematics underlying public
key cryptography. Our main focus is mathematics. We put mathematical precision and
rigour ahead of generality, practical issues in real-world cryptography, or algorithmic
optimality.
Author: Steven Galbraith - 2012.
An Introduction to Mathematical Cryptography
Detailed introduction to elliptic curves and how they're used in cryptography, including the “hot” recent
topic of elliptic curve pairing-based cryptography
Detailed introduction to lattices and lattice based cryptography. Provides an entry for graduate students
into an active field of research. Includes exercises and examples at the end of each section. A standard
reference for researchers in the field. May be implemented in a classroom setting or independent study
Authors: Hoffstein, Jeffrey, Pipher, Jill, Silverman, J.H.
Cryptography Engineering Design Principles and Practical Applications
Chapter 9 about generating randomness and the implementation of Fortuna PRNG.
Authors : Niels Ferguson - Bruce Schneier - Tadayoshi Kohno
Interaction Combinators
Yves Lafont is a french mathematician who developed Interaction Nets, a graphical model of computation. Based on this work, the company High Order Company is developing, the highly parallel, Bend language.
Yves Lafont - 1990
Animal Crossing est NP Difficile Bien entendu, dire qu’Animal Crossing est NP-Difficile est un abus de langage... Cependant, les mécaniques du jeu sont assez complexes pour rapidement faire émerger de tels problèmes ! Voyons cela !
Introductory Quantum Computing This online document helps the absolute beginners to persue in the future direction in coding and Quantum Computing. The lesson starts with fundamental of qubits, quantum gates and quantum circuits and quantum algorithms.
Understanding quantum technologies 2024
Olivier Ezratty advises and trains businesses and public services in the development of their innovation
strategies
around deep techs and, in particular, quantum technologies. He brings them a 360° understanding of
scientific,
technology, marketing as well as ecosystems development.
Author: Olivier Ezratty
Quantum algorithms for estimating quantum entropies
This paper present quantum algorithms for Quantum entropy. It presents the Von Neumann and RĂ©nyi methods.
Authors: Youle Wang - Benchi Zhao - Xin Wang
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification
This paper present several methods of entropy calculation in order to detect if the file has been encrypted or not. It is a very precious work for malware detection which is a very sensitive field.
Authors : Simon R. Davies - Richard Macfarlane - William J. Buchanan - 2022
An Advanced Quantum-Entropy Based Ransomware Detection Mechanism Another paper about malware detection but this time with a new method based on quantum entropy. It proposed a new algorithm called QEDD. Eric Mazunin - Ronald Bishop - Elizabeth Carter - Lawrence Knight - 2024
Digital Signature Standard - FIPS PUB 186-4 This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. This standard also specifies DSA (digital signature algorithm) which is used to implement public key cryptography more securely such as RSA, DH or EC.
Recommendation for Pair-Wise Key Establishment Using Integer Factorization Cryptography This Recommendation specifies key-establishment schemes using integer factorization cryptography (in particular, RSA). Both key-agreement and key transport schemes are specified for pairs of entities, and methods for key confirmation are included to provide assurance that both parties share the same keying material. In addition, the security properties associated with each scheme are provided.
Announcing the ADVANCED ENCRYPTION STANDARD (AES) FIPS approved standard for the The Advanced Encryption Standard (AES) cryptographic algorithm.
NIST Releases First 3 Finalized Post-Quantum Encryption Standards This page leads to the first three pulication of the NIST for Post-Quantum encryption standards. You can read about Module-Lattice-Based Digital Signature Standard, Key encapsulation and stateless hash-based DSA.