Applications
- 281
- Hiji Bij Bij
- Describes a stream cipher devised by Palash Sarkar and the Cryptology Research Group at the India Statistical Institute. Like many new stream ciphers, it has two parts to its state, one part updated linearly and one part updated non-linearly. The linear part is implemented as cellular automata. The cipher can run in a self-synchronizing mode. The C source code is in this postscript document.
- 282
- ISAAC - a fast cryptographic random number generator
- A stream cipher developed by Robert Jenkins. It was inspired by RC4.
- 284
- Scream: A Software Efficient Stream Cipher
- Describes the Scream stream cipher developed at IBM by Shai Halevi, Don Coppersmith, and Charanjit Jutla. Scream is based on SEAL. Source code is not available here. [PDF]
- 285
- Serpent Block Cipher Homepage
- Describes the 128-bit block cipher designed to replace DES. It was a finalist in the AES competition.
- 286
- Sosemanuk Stream Cipher
- Sosemanuk borrows features of the Snow stream cipher and the Serpent block cipher. The C source code for the cipher is available from the Ecrypt site. [PDF]
- 287
- The Mugi Stream Cipher
- Describes the MUGI stream cipher developed at Hitachi. MUGI is similar to, and based on, Panama. The link here is to the English home page of the MUGI site. Source code is not available at this site.
- 288
- VMPC function and stream cipher
- Describes the VMPC one-way function and a stream cipher based on it, designed by Bartosz Zoltak. Pseudo code and test-vectors are available here. The algorithm is similar to RC4 and VERY simple.
- 289
- Zodiac Killer Ciphers
- The Zodiac Killer terrorized the San Francisco Bay area in the 1960s and 70s and claimed to have killed over 30 people. This site discusses the unsolved cipher messages linked with the killings.
- 290
- DevOTechS: Huge Integer Math and Encryption Library (HIME)
- A dll for implementing public and secret key encryption using RSA, AES, SHA-256. Also contains functions for prime number generation, random number generation and huge integer operations.
- 292
- Punkroy and the Cypher Project
- Collection of programming examples on encryption including: file encryption, steganography in images and sound, data base record encryption, and password verification. All written in Pascal, all source code available.
- 294
- SSL++ -- C++ Wrapper around OpenSSL library
- SSL++ is simple C++ library encapsulating OpenSSL functionality to make it simple and easily accessible to C++ programmers.
- 295
- SlavaSoft QuickHash Library
- Allows hash, checksum and HMAC calculations to be added to Windows applications. C++, commercial.
- 297
- libmcrypt
- Implements an interface to access block and stream encryption algorithms. Includes a full list of algorithms supported. ANSI C.
- 298
- Cambridge Univ's Computer Security Group
- Research Interests: Security Protocols, Formal Methods, Reliability of Security Systems, Medical Information Security, Cryptographic Algorithms, Steganography and Information Hiding, Digital Watermarking, Hardware Security, Electronic Commerce
- 299
- Computer Security and Industrial Cryptography
- Kuleuven Univ, Belgium. Interests: Design, evaluation, and implementation of crypto algorithms and protocols, and on the development of security architectures for computer systems and telecom networks. Also theoretical work in crypto algorithms related to discrete mathematics.