Enter Domain Name:

Top / Science / Math / Applications / Communication_Theory / Cryptography / Algorithms / Public_Key /

How the RSA Cipher Works
An elementary account of the mathematics behind the RSA cryptosystem.
http://www.muppetlabs.com/~breadbox/txt/rsa.html
Muppetlabs.com  ~   Site Info   Whois   Trace Route   RBL Check  
The IEEE P1363 Project
Standard specifications for public-key cryptography.
http://grouper.ieee.org/groups/1363/
Ieee.org  ~   Site Info   Whois   Trace Route   RBL Check  
SECG Standards
Elliptic curve cryptography recommended standards.
http://www.secg.org/secg_docs.htm
Secg.org  ~   Site Info   Whois   Trace Route   RBL Check  
Elliptic Curves and Cryptology
Marc Joye's list of resources that include people, books, and links. Many preprints are available from the site.
http://www.geocities.com/marcjoye/biblio_ell.html
Geocities.com  ~   Site Info   Whois   Trace Route   RBL Check  
Passive Privacy System
PPS is a specification for email programs to follow to exchange public keys and encrypt mail. There is no PPS ``program, though. Each email system may find its own way to impliment PPS, and may have different criteria for the user-interface.
http://pps.sourceforge.net/
Sourceforge.net  ~   Site Info   Whois   Trace Route   RBL Check  
RSA Public Key Implementation in Python
Using OpenSSL RSA commands and an RSA Public Key Implementation in Python.
http://www.dsm.fordham.edu/~mathai/openssl.html
Fordham.edu  ~   Site Info   Whois   Trace Route   RBL Check  
Hidden Field Equations Home Page
Contains information, in-depth analyses and links to references. Maintained by Nicolas Courtois.
http://www.cryptosystem.net/hfe/
Cryptosystem.net  ~   Site Info   Whois   Trace Route   RBL Check