Cryptographic Concepts, Methodologies, and Practices
Cryptographic Transitions, Ralph Spencer Poore
Blind Detection of Steganographic Content in Digital Images Using Cellular Automata, Sasan Hamidi, Ph.D.
An Overview of Quantum Cryptography, Ben Rothke
Elliptic Curve Cryptography: Delivering High-Performance Security for E-Commerce and Communications, Paul Lambert
Cryptographic Key Management Concepts, Ralph Spencer Poore
Message Authentication, James S. Tiller
Fundamentals of Cryptography and Encryption, Ronald A. Gove
Steganography: The Art of Hiding Messages, Mark Edmead
An Introduction to Cryptography, Javek Ikbel
Hash Algorithms: From Message Digests to Signatures, Keith Pasley
A Look at the Advanced Encryption Standard (AES), Ben Rothke
Understanding SSL, Chris Hare
IPSec Virtual Private Networks, James S. Tiller
Private Key Algorithms
Principles and Applications of Cryptographic Key Management, William Hugh Murray
Public Key Infrastructure (PKI)
Getting Started with PKI, Harry DeMaio
Preserving Public Key Hierarchy, Geoffrey C. Grabow
PKI Registration, Alex Golod
System Architecture for Implementing Cryptographic Functions
Implementing Kerberos in Distributed Systems, Joe Kovara and Ray Kaplan
Methods of Attack
Methods of Attacking and Defending Cryptosystems, Joost Houwen
Use of Cryptography
Auditing Cryptography: Assessing System Security, Steve Stanek