The first part of a series looking at cryptography and how it’s used. This week Kris is focusing on cryptographic hash algorithms and public key encryption, two technologies that power virtually every aspect of digital security.
Is Security by Obscurity a Valid Approach?
Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance (pdf)
SHAttered attack on SHA1
The First Collision for Full SHA-1 (pdf)
A Stick Figure Guide to the Advanced Encryption Standard
Diffie and Hellman’s New Directions in Cryptography (1976, pdf)