楊中皇老師 一百零五學年度 第二學期 (Spring 2017) 「密碼學研究」參考資料 :

  1. 課程大綱 (Syllabus)

  2. 國立高雄師範大學行事曆
  3. 高雄師範大學開課資料查詢系統
  4. 學校選課學生名單
  5. 期中報告(軟體功能與安裝): 預定4月27日。
  6. 期末報告(軟體操作使用): 預定6月15日。
  7.   姓名

    軟體功能、安裝與使用

     相關網址

    1

    唐劍飛

    OpenKeychain

    https://github.com/open-keychain/open-keychain

    2

    李孟樵

    ECDH-Curve25519-Mobile

    https://github.com/duerrfk/ecdh-curve25519-mobile

    3

    沈瑞琳

    FIPS Library and Android

     https://wiki.openssl.org/index.php/FIPS_Library_and_Android

    4

    林紀睿

    ECDH key exchange on Android

     https://github.com/nelenkov/ecdh-kx

     

     

     

     

  8. 論文研讀:

       林紀睿           

    (1) Performance Evaluation of Primitives for Privacy-Enhancing Cryptography

       唐劍飛

    (2) Evaluation of Cryptographic Capabilities for the Android Platform

       李孟樵

    (3) An Empirical Study of Cryptographic Misuse in Android Applications

       沈瑞琳

    (4) Evaluation of Cryptography Usage in Android Applications

     

  9. 微軟Windows Cryptographic Primitives

  10. Android設備 Cryptographic Primitives

  11. 微信支付的安全規範  (local copy)  

  12. Android 7.1 Security Model Compatibility

  13. SM2橢圓曲線公鑰密碼算法、SM3密碼雜湊算法、SM4分組密碼算法

  14. 智慧型手機市場銷售 (2016)

  15. 強迫召回 三星將讓美Note 7不能用

  16. 安琚B威努特、滴滴出行招聘安全人员

  17. 太極信息安全招聘十大類安全人才

  18. 加拿大Certicom Corp.

  19. 大陸國家信息安全產品認證,http://www.isccc.gov.cn/zxyw/cprz/gjxxaqcprz/

  20. A Brief Overview of Cryptography, https://www.youtube.com/watch?v=Wgw3HNuKIN8

  21. Elliptic Curve Cryptography, https://www.youtube.com/results?search_query=elliptic+curve+cryptography

  22. Android Security State Of The Union, https://www.youtube.com/watch?v=aBWh7izacqg

  23. What's new in Android security (M and N Version) - Google I/O 2016, https://www.youtube.com/watch?v=XZzLjllizYs

  24. Android security architecture (by Nikolay Elenkov), https://www.youtube.com/watch?v=3asW-nBU-JU

  25. Nikolay Elenkov, Android Security Internals, 2014.

  26. Android Full-disk encryption
  27. Android 基于文件的加密

  28. 橢圓曲線公式繪圖 EccDraw.exe

  29. A.J. Menezes, et al, Handbook of Applied Cryptography  (CRC Press Series on Discrete Mathematics and Its Applications), 1996. 參閱http://www.cacr.math.uwaterloo.ca/hac/有PDF電子檔

  30. Android Security, https://source.android.com/security/

  31. Audun Jøsang, "Trust and Identity Management for Internet and Mobile Computing, " IET Information Security - Special Issue on Trust and Identity Management in Mobile and Internet Computing and Communications, 2012.

  32. HwanJin Lee, DongHoon Shin, and Hyun-Chul Jung, "Implementations of Block Cipher SEED on Smartphone Operating Systems, " Proceedings of the Fifth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2011).

  33. Nico Golde, SMS Vulnerability Analysis on Feature Phones,  M.S. Thesis, Technische Universität Berlin, Germany, 2011.

  34. Christian Hansen, A Framework for Identity and Privacy Management on Mobile Devices,  M.S. Thesis, University of Agder, Norway, 2010.

  35. Adrian Visoiu and Silvia Trif, "Open Source Security Components for Mobile Applications," Open Source Science Journal, Vol. 2, No. 2, 2010.

  36. Marco Bonetti, "Mobile privacy: Tor on the iPhone and other unusual devices, " DEFCON 18, 2010.

  37. Johannes Winter, "Trusted Computing Building Blocks for Embedded Linux-based ARM TrustZone Platforms," Proceedings of the 3rd ACM workshop on Scalable Trusted Computing, 2008.

  38. Murat Y. Kubilay, Security on Mobile Phones with Lightweight Cryptographic Message Syntax, M.S. Thesis, Middle East Technical University, Turkey, 2007.

  39. Florian Eisl, Smart Card Security Services for an Open Application Environment used in Mobile Phones, M.S. Thesis, Lund University, Sweden, 2004.

  40. Johnny L. Lo, A framework for cryptography algorithms on mobile devices, M.S. Thesis, University of Pretoria, South Africa, 2007.

  41. 線上課程Coursera.org網站,密碼學-I密碼學-II
  42. SELinux

  43. Android javax.crypto

  44. Android java.security

  45. Android Software Development Kit (SDK)
  46. Android Native Development Kit (NDK)
  47. Java Development Kit (JDK)
  48. Eclipse Downloads
  49. 手機市場佔有率
  50. Android Market
  51. Open Handset Alliance
  52. Android-x86
  53. 密碼學常見問題集 (FAQ)
  54. 美國國立密碼博物館 (National Cryptologic Museum)

  55. 國家圖書館 全國博碩士論文資訊網

  56. Right triangles and elliptic curves, http://math.uci.edu/~krubin/lectures/sumo/

  57. GuardKey (MyGuard) 保密碟, http://www.guardkey.com.tw/tw/

  58. Sun (Oracle)的密碼學演算法:https://docs.oracle.com/middleware/1213/idm/sec-app-dev-tools/crypto.htm#SDTRG002

  59. 日本政府Cryptrec計畫

  60. Cryptrec 2007報告書 (local copy)  

  61. 中國密碼學會, http://www.cacrnet.org.cn/

  62. 國家實驗研究院科技政策研究與資訊中心之大陸資訊安全機構名錄

  63. 大陸信息安全國家重點實驗室(The State Key Laboratory of Information Security,SKLOIS)

  64. 西安電子科技大學李暉教授:信息安全專業學生實踐能力培養的探索 (local copy)

  65. 西安電子科技大學王育民教授:資訊理論等專業的建設和參與建設的體會 (local copy)

  66. 西安電子科技大學王育民教授:訊息論專業發展的幾個片段 (local copy)

  67. 西安電子科技大學王育民教授:我與西電圖書館 世界圖書日有感 (local copy)

  68. 2009年西安電子科技大學通信工程學院工程碩士指導教師名單 (local copy)

  69. 密碼學常見問題集 (FAQ)

  70. 大數分解有獎徵 答

  71. 線上大數分解

  72. 密碼學相關免費工具軟體:(1) 木田祐司之UBASIC

  73. 密碼學相關免費工具軟體:(2) LiDIA  

  74. 密碼學相關免費工具軟體:(3) MIRACL 

  75. 密碼學相關免費工具軟體:(4) GMP 

  76. 密碼學相關免費工具軟體:(5) PARI-GP 

  77. 密碼學相關免費工具軟體:(6) NTL  

  78. 密碼學相關免費工具軟體:(7) Crypto++

  79. 密碼學相關免費工具軟體:(8) NUI Crypto

  80. Darrel Hankerson, Alfred Menezes, and Scott Vanstone, Guide to Elliptic Curve Cryptography, 2004.

  81. 2004年5月中國密碼年會與2004年8月美國Crypto年會的Rump Session,山東大學王小雲教授破解MD5和其他幾個one-way hash function (local copy)。NIST宣佈將於2010年淘汰SHA1 (local copy)

  82. 日本IPA資訊安全現狀, 2001年 (local copy)

  83. Claude E. Shannon, "Communication Theory of Secrecy Systems", Bell System Technical Journal, vol.28-4, page 656-715, 1949. (local copy)

  84. A Layman's Guide to a Subset of ASN.1, BER, and DER: MS-Word, PostScript

  85. Certicom公司橢圓曲線密碼系統介紹

  86. FIPS 186-2Digital Signature Standard (DSS) January 2000http://csrc.nist.gov/publications/fips/fips186-2/fips186-2.pdf, http://csrc.nist.gov/publications/drafts/dss_recommendation.pdf

  87. NISTElliptic Curves Recommended for Federal Government UseJuly 1999 http://csrc.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.pdf

  88. D. B. Johnson and A. J. Menezes, Elliptic Curve DSA (ECDSA): An Enhanced DSA, 1999.

  89. 日本高知工業高等専門学校 高木和久(Kazuhisa Takagi) 橢圓曲線密碼系統介紹

  90. NISTDraft FIPS 180-2,Secure Hash Standard (SHS),SHA-256/SHA-384/SHA-512May 2001.

  91. 日本密碼產品之輸出管制

  92. 一天內破解DES報導: (1). RSA公司 (2). CNN公司  1999年1月

  93. 破解512位元RSA (1999年8月

  94. D. M. Gordon, "A Survey of Fast Exponentiation Methods," J. Algorithms, 1998,pp. 129-146.

  95. T. Garefalakis, "Primality Testing, Integer Factorization, and Discrete Logarithms," 2000.

  96. 破解109位元ECC (2002年11月) (mirror)
  97. Advanced Encryption Standard, FIPS 197, November 26, 2001.

  98. AES (Advanced Encryption Standard): October 2, 2000 - NIST announces that Rijndael has been selected as the proposed AES.

  99. RIJNDAEL (pronounced Rhine-doll)加解密演算法

  100. AES (Advanced Encryption Standard) 原始碼

  101. 人類目前已知最大的質數: 230402457-1 (9,152,052  decimal digits ) = ?  

  102. 逐年找到的大質數

  103. 大數分解紀錄

  104. One-Way Hash MD5原始碼(RFC1321)

  105. FIPS 180-2Secure Hash Standard (SHS)NIST,2002年8月。

  106. Block Cipher Modes of OperationSP 800-38ANIST,2001年12月。

  107. Arjen K. Lenstra and Eric R. Verheul, "Selecting Cryptographic Key Sizes", 1999.

  108. 密碼學技術評價報告書,IPA,2001年3月(日文)。

  109. 密碼學應用技術手冊,ECOM,2000年3月(日文)。

  110. Tamper Resistant密碼學演算法報告書,日本標準協會JSA,2004年3月(日文)。(local copy)

  111. 于根正志、岡本龍明,最近數位簽章之理論研究,日本銀行金融研究所,1999年11月(日文)。

  112. Sneakers (神鬼尖兵)

  113. 微軟公司CryptoAPI2.0

  114. 搜索引擎 AltaVista

  115. 搜索引擎 All the Web

  116. Windows 2000 Security Services

  117. 微軟公司視窗2000安全性服務 (中文)

  118. Claude E. Shannon, "Communication Theory of Secrecy Systems,"  Bell System Technical Journal,  Vol. 28, 1949, pp. 656-715.

  119. Claude E. Shannon, "A Mathematical Theory of Communication,"  Bell System Technical Journal,  vol. 27, pp. 379-423 and 623-656, July and October, 1948.

  120. National Institute of Standards and Technology (NIST), Federal Information Processing Standard (FIPS) 46-3, Data Encryption Standard (DES),  October 25, 1999.

  121. Eli Biham and Adi Shamir, Differential cryptanalysis of DES-like cryptosystems, Technical report CS90-16, Weizmann Institute of Science, 1990.

  122. J. L. Massey, "An Introduction to Contemporary Cryptology," Proc. IEEE,  Vol. 76, May 1988, pp. 533-549.

  123. W. Diffie and M. Hellman, "New Directions in Cryptography," IEEE Transactions on Information Theory, November 1976, pp. 644-654.

  124. W. Diffie, "The First Ten Years of Public-Key Cryptography," Proc. IEEE,   Vol. 76, No. 5, May 1988, pp. 560-577.

  125. T. Okamoto and E. Fujisaki, "On Comparison of Practical Digital Signature Schemes," NTT Review, Vol. 5, No. 1, January 1993, pp. 75-81.

  126. Specification of ESIGN Signature, Self Evaluation of ESIGN Signature.

  127. T. Okamoto, E. Fujisaki, and H. Morita, "TSH-ESIGN: Efficient Digital Signature Scheme Using Trisection Size Hash," submitted to IEEE P1363a, 1998. (pdf or zipped PostScript or PostScript format)

  128. Tatsuaki Okamoto, Shigenori Uchiyama and Eiichiro Fujisaki, "EPOC: Efficient Probabilistic Public-Key Encryption," submitted to IEEE P1363a, November 1998.  Specification of EPOC, Self Evaluation of EPOC.

  129. Camallia加解密演算法(Techniques SpecificationsSelf Evaluation Reports)

  130. Encrypting File System for Windows 2000

  131. RFC 2630, Cryptographic Message Syntax. R. Housley. June 1999.

  132. RFC 2628, Simple Cryptographic Program Interface (Crypto API). V. Smyslov. June 1999.

  133. RFC 2612,  The CAST-256 Encryption Algorithm. C. Adams, J. Gilchrist. June 1999.

  134. RFC 2437, PKCS #1: RSA Cryptography Specifications Version 2.0. B. Kaliski, J. Staddon. October 1998.

  135. RFC 2315, PKCS 7: Cryptographic Message Syntax Version 1.5. B. Kaliski. March 1998.

  136. Call for Papers: IACR Calendar of Events in Cryptology UCL Crypto Group - Call for papers Security & Privacy Calendar