Many ebooks from CRG-- Security,Cryptography, and much more.
Results 1 to 5 of 5

Thread: Many ebooks from CRG-- Security,Cryptography, and much more.

  1. #1
    Banned
    Join Date
    Jun 2002
    Posts
    289

    Many ebooks from CRG-- Security,Cryptography, and much more.

    the power of google.. looking for something and came across this.

    "Food for thought" from Sussex University Communications Research Group.
    http://www.comms.engg.susx.ac.uk/fft/

    here's most what you'll find there.

    Computer Programming
    Art of Assembly language [pdf,tgz]
    Art of Assembly language (High Level Assembler) [pdf]
    Thinking in C++, 2nd Edition, Volume 2 [online(frames,no frames)]
    Thinking in C++, 2nd Edition, Volume 2, Example Codes [online,tgz]
    C++ Programming style [txt]
    Multithreaded Programming Guide (Sun Microsystems) [pdf]
    POSIX.1c/D10 Summary (Sun Microsystems) [ps,pdf]
    pthreads and Solaris threads: A comparison of two user level threads APIs (Sun Microsystems) [ps,pdf]
    Thinking in Java, 2nd Edition [online(frames,no frames)]
    Thinking in Java, 2nd Edition, Example Codes [online,tgz]
    Intel Architecture optimizations [pdf]
    Adaptive Communication Environment (ACE) library API [online]
    Java comm API [online]
    JDK 1.3 API [online]
    JDK 1.4 API [online]
    HTML 4.0 Reference [online]
    Data Display Debugger (DDD) 3.3.1 Manual [online]
    Writing Multithreaded Code in Solaris [pdf]
    Intel Architecture Optimization Manual [pdf]
    Intel Architecture Software Developer's Manual, Volume 1, Basic Architecture [pdf]
    Intel Architecture Software Developer's Manual, Volume 2, Instruction Set Reference [pdf]
    Intel Architecture Software Developer's Manual, Volume 3, System Programming [pdf]
    Performance of Various Computers Using Standard Linear Equations Software [pdf]
    The SPARC Architecture Manual, Version 8 [pdf]
    The SPARC Architecture Manual, Version 9 [pdf]
    UltraSPARC I-II User's Manual [pdf]
    UltraSPARC IIi User's Manual [pdf]
    microSPARC IIep User's Manual [pdf]
    SuperSPARC II Addendum [pdf]
    Alpha Architecture Handbook, Version 4 [pdf]
    System V Application Binary Interface, Edition 4.1 [pdf]
    System V Application Binary Interface, Intel386 Architecture Processor Supplement, Edition 4 [pdf]
    MIPS R4000 Microprocessor User's Manual, 2nd Edition [pdf]
    The 32-bit PA-RISC Run-time Architecture Document, HP-UX 10.20, Version 3 [pdf]
    The 32-bit PA-RISC Run-time Architecture Document, HP-UX 11.00, Version 1 [pdf]
    ANSI/ISO C++ Professional Programmer's Handbook [pdf]


    VHDL
    VHDL CookBook by Peter J. Ashenden [pdf]
    Analog and Mixed-Signal Modeling using VHDL-AMS [pdf]
    European Space Agency (ESA) VHDL Modelling Guidelines [pdf]
    US Navy VHDL Modelling Guide [pdf(1,2,3,4,5,6,7)]


    Operating systems
    Introduction to OS [pdf]
    Process scheduling [pdf]
    Resource management and deadlocks [pdf]
    I/O Management [pdf]
    Filesystem [pdf]
    Memory management [pdf]
    Interprocess communication [pdf]
    System security [pdf]


    Cryptography
    A Cryptography Tutorial [summary,pdf(1,2,3,4,5,6,7,8)]
    Another Cryptography tutorial [pdf(1,2,3,4,5,6,7)]
    Cryptography - The myths [pdf]
    A Cryptograpgic Compendium [link]
    Frequently Asked Questions about Today's Cryptography by RSA Laboratories [pdf]
    Security protocols overview by RSA Laboratories [pdf]
    Security Pitfalls in Cryptography [pdf]
    Stream ciphers [pdf]
    Understanding Public Key Infrastructure [pdf]
    Trust Models and Management in Public-Key Infrastuctured [pdf]
    Why Cryptography is Harder than it looks [pdf]
    Cryptanalytic Attacks on Pseudorandom Number Generators [pdf]
    CryptoBytes, RSA newsletter [pdf(1-1,1-2,1-3,2-1,2-2,2-3,3-1,3-2,4-1,4-2)]
    RSA Laboratories' Bulletin [pdf(1,2,3,4,5,6,7,8,9,10,11,12,13)]
    Smartcard security [pdf]
    Digital Signatures, Certificates and Electronic Commerce [pdf]
    Key recovery - Meeting the Needs of Users or Key Escrow in Disguise [pdf]
    Implementation Experience with AES Candidate Algorithms [pdf]
    Performance Analysis of AES candidates on the 6805 CPU core [pdf]
    UK Government Organisations Involved in Communications and Information Systems Security [pdf]
    The block cipher Square [pdf]
    Attacks on Cryptoprocessor Transaction Sets [pdf]
    Initial Cryptanalysis of the RSA SecurID Algorithm [pdf]
    Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent [pdf]
    Preliminary Cryptanalysis of Reduced-Round Serpent [pdf]
    Defective Sign and Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML [pdf]
    Compliance Defects in Public-Key Cryptography [pdf]
    Architectural considerations for cryptanalytic hardware [pdf]
    WEP Fix using RC4 Fast Packet Keying [pdf]
    RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4 [pdf]
    Block Ciphers [pdf]
    Stream Ciphers [pdf]
    C.R.I.S.I.S. - Cryptography's Role In Securing the Information Society [pdf]
    Universal Hashing and Multiple Authentication [pdf]
    Timing Analysis of Keystrokes and Timing Attacks on SSH [pdf]
    The simple ideal cipher system [pdf]
    An FPGA Implementation of the Linear Cruptanalysis [pdf]

    The math behind the RSA cipher [txt]
    RSA hardware implementation [pdf]
    High-Speed RSA implementation [pdf]
    Are 'Strong' Primes Needed for RSA? [pdf]
    RSAES-OAEP Encryption scheme [pdf]
    Has the RSA algorithm been compromised as a result of Bernstein's Papar? [pdf]
    Are 'Strong' Primed Needed for RSA? [pdf]
    Why Textbook ElGamal and RSA Encryption are Insecure [pdf]

    The DES algorithm [txt]

    The RC5 encryption algorithm [pdf]
    On The Security of the RC5 Encryption Algorithm [pdf]
    The ESP RC5-CBC Transform [txt]
    The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms [txt]

    The RC6 block cipher [pdf]
    RC6 as the AES [pdf]
    The security of RC6 block cipher [pdf]
    Statistical testing of RC6 block cipher [pdf]

    Blowfish algorithm in plain English [txt]
    Source code for Blowfish implementation [zip(C++,Another C++,Java,ANSI C,Another ANSI C,Forth,Pascal)]

    Twofish: A 128-bit Block Cipher [pdf]
    Upper bounds on differential characteristics in Twofish [pdf]
    Impossible differentials in Twofish [pdf]
    A Twofish retreat: Related-Key attacks against Reduced-Round Twofish [pdf]
    Further observations on the Key Schedule of Twofish [pdf]
    Empirical verification of Twofish key uniqueness properties [pdf]
    Key separation in Twofish [pdf]
    Improved Twofish implementations [pdf]
    Implementation of the Twofish Cipher using FPGA devices [pdf]
    Source code for Twofish implementation [zip(6805(Smartcard),Z80,Reference C code,ANSI C and i386 asm,Optimised ANSI C,Optimised C code [Linux code],Visual Basic,Java)]

    The Rijndael Block Cipher [pdf]
    A Specification of Rijndael, the AES Algorithm [pdf]
    Efficient Implementation of the Rijndael S-box [pdf]

    The Elliptic Curve Cryptosystem [pdf]
    Elliptic Curce Cryptosystems [pdf]
    Elliptic Curve Cryptography, Future Resiliency and High Security Systems [pdf]
    The Elliptic Curve Cryptosystem for Smart Cards [pdf]
    The Elliptic Curve Digital Signature Algorithm (ECDSA) [pdf]
    Recommendation on Elliptic Curve Cryptosystems [pdf]
    Elliptic Curve Cryptosystems on Reconfigurable Hardware [pdf]


    Security
    Program Stack vulnerability [txt]
    Non-executable Program Stack vulnerability [txt]
    Strange Attractors and TCP/IP Sequence Number Analysis [link]
    Rainbow book series [link]
    Kernel Level Vulnerabilities, Behind the Scenes of the 5th Argus Hacking Challenge [pdf]
    Attacks on and Countermeasures for USB Hardware Token Devices [pdf]
    UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes [pdf]
    Countermeasures against Buffer Overflow Attacks [pdf]
    Integrating Flexible Support for Security Policies into the Linux Operating System [pdf]
    Flaw in NTRU Signature Scheme (NSS) [pdf]
    Meeting Critical Security Objectived with Security-Enhanced Linux [pdf]
    Secure Programming with Linux and Unix [pdf]
    Reverse Compilation Techniques [pdf]
    What Should be Hidden and Open in Computer Security: Lessons from Deception, the Art of War, Law, and Economic Theory [pdf]
    Stack Smashing Vulnerabilities in the UNIX Operation System [pdf]


    Networking
    Networking concepts [pdf]
    Introduction to Internet Protocols [txt]
    Network planning and design [pdf]
    Queuing analysis [pdf]
    Parallel FTP performance in a High-Bandwidth High-Latency WAN [pdf]
    Compete WAP Security [pdf]
    Cryptographic Authentication fo Real-Time Network Protocols [pdf]
    Temporary Committee on the ECHELON Interception System Report (Working Document) [pdf]
    IP Multicast Configuration [pdf]
    Can Shortest-path Routing and TCP Maximize Utility [pdf]
    A new TCP congestion control with empty queues and scalable stability [pdf]
    FAST Kernel: Backgroung Theory and Experimental Results [pdf]
    Robustness and the Internet: Design and evolution [pdf]
    Robust congestion control for the Internet [pdf]
    A Mathematical Framework for Designing a Low-Loss, Low-Delay Internet [pdf]
    On the stability of networks operating TCP-like congestion control [pdf]
    Ultrascale Network Protocols for Computing and Science in the 21st Century [pdf]


    Computer Clusters
    High Performance Computing and Beowulf Clusters [pdf]
    Web Search for a Planet: The Google Cluster Architecture [pdf]


    Bluetooth
    Specification of the Bluetooth System v1.1 22-02-2001 (Core) [pdf]
    Specification of the Bluetooth System v1.1 22-02-2001 (Profiles) [pdf]
    SyncML Over Bluetooth [pdf]
    Bluetooth Network Encapsulation Protocol (BNEP) Specification [pdf]
    Bluetooth Extended Service Deiscovery Profile (ESDP) for Universal Plug and Play (UPnP) [pdf]
    Personal Area Networking (PAN) Profile [pdf]
    Bluetooth Security White Paper [pdf]
    Security Comparison: Bluetooth vs 802.11 [pdf]


    Mathematics
    SOS Mathematics [link]
    Mathematics archives [link]
    Dave's math tables [link]
    On-line Encyclopedia of Integer Sequences [link]
    Notes on Fermat's Last Theorem by A. J. Van Der Poorten [pdf(1,2,3,4,5,6,7,8)]
    p-adic Chaos and Random Number Generation [pdf]
    Introduction to Probability Theory [pdf]
    Calculus - One-Variable Calculus, with an Introduction to Linear Algebra [pdf]
    Introduction to Methods of Applied Mathematics or Advances Mathematical Methods for Scientists and Engineers [pdf]
    Tables of Integrals and other Mathematical data [pdf]
    Random Generators and Normal Numbers [pdf]
    Ramanujan's Notebooks [pdf(pdf,pdf)]
    Prime Percolation [pdf]
    Prime Numbers with a Fixed Number of One Bits or Zero Bits in Their Binary Representation [pdf]
    Perturbation Theory of Dynamical Systems [pdf]
    On Fourier and Zeta(s) [pdf]
    Newton's Formula and the Continued Fraction Expansion of sqrt(d) [pdf]
    Linear Algebra [pdf]
    Linear Algebra - Answers [pdf]
    New Representations for the Madelung Constant [pdf]
    Sums of Squares, Cubes, and Higher Powers [pdf]
    Computing A Glimpse of Randomness [pdf]
    Computing the Generating Function of a Series Given its First Few Terms [pdf]
    Asymptotic Behavior of Excitable Cellular Automata [pdf]
    An Efficient Algorithm for Computing the Ith Letter of phi^n(a).pdf [pdf]
    Algebraic Topology [pdf]
    A Proof of a Conjecture of Knuth [pdf]
    A Practical Version of the Generalized Lagrange Algorithm [pdf]


    Engineering
    Theoretical Computer Science cheat sheet [pdf]
    A mathematical theory of Communication [pdf]
    A Primer on Asynchronous Modem Communication [pdf]
    Dictionary of Algorithms, Data Structured, and Problems [link]
    Computing dictionary [link]
    Acronym lookup engine [link]
    StudyWeb search engine [link]


    UNIX
    Unix is a Four Letter Word, and Vi is a Two Letter Abbreviation [pdf]
    Some useful UNIX Commands written down by Razor for newbies to get a start in UNIX [pdf]
    UNIX [pdf]
    Intermediate Unix Training [pdf]
    VI lovers [link]
    Unix Programming Tools [pdf]
    Unix history timeline (1969-2000) [pdf]
    Executable and Linkable Format (ELF) [txt]
    A Whirlwind Tutorial on Creating Really Teensy ELF Executables for Linux [online]
    Guide to Unix IPC [link]
    The Linux Kernel API [pdf]
    Unreliable guide to Linux kernel locking [pdf]
    Unreliable guide to hacking the Linux kernel [pdf]
    Linux 2.4 NAT Howto [pdf]
    Linux advanced routing Howto [pdf]
    Linux Netfilter hacking Howto [pdf]
    Samba 2.2 [online]
    Samba TNG [online]


    USENIX
    Token-Mediated Certification and Electronic Commerce [pdf]
    The Linux BIOS [pdf]
    LOBOS: (Linux OS Boots OS) Booting a kernel in 32-bit mode [pdf]

    I wish I had broadband and a DVD writer.. is there a santa in the house ?

  2. #2
    Senior Member
    Join Date
    Jul 2003
    Posts
    813
    Uh I might begin to celebrate Christmas again after this
    /\\

  3. #3
    Junior Member
    Join Date
    Jan 2004
    Posts
    10
    Have a nice day...u made mine beautiful!!!Start reading.....................

  4. #4
    AO Guinness Monster MURACU's Avatar
    Join Date
    Jan 2004
    Location
    paris
    Posts
    1,003
    enought here to keep me happy for a long time

    thanks a very good rescource.

  5. #5
    Member
    Join Date
    Dec 2003
    Posts
    33
    thats huge!!

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides