Projects            | CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness (2014--2017) |
NIST hash function competition (2008--2012) | |
ECRYPT II (2008--2012) | |
ECRYPT I (2004--2008) | |
  | |
Mailing List | cryptography at metzdowd.com (archive) |
subscribe by sending "subscribe cryptography" to: majordomo at metzdowd.com | |
Newsgroup       | sci.crypt   sci.crypt.research   sci.crypt (by thread) |
Newsletter       | crypto-gram |
  | |
Textbooks           | Cryptography and Network Security, William Stallings |
Cryptography: Theory and Practice, Douglas R. Stinson | |
Books           | Handbook of Applied Cryptography, Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone (free online version available) |
Practical Cryptography, Niels Ferguson and Bruce Schneier | |
The Codebreakers - The Story of Secret Writing, David Kahn (history of cryptography before 1967) | |
Other cryptography books |