SecurityPortal
Commercial Enterprises
-
AccessData
- Alcatel.
- Anonymize.net
- AT&T:
- Algorithmic Research
- ASG Technologies
- Axent
- Baltimore Technologies
- BlueMoney
-
BroadVision
-
CertCo
-
CertiCom
- CipherLink
-
Codex
-
Computer Systems Consulting
(CSC):
-
COST (Computer Security Technologies)
-
Counterpane Internet Security, Inc.
Counterpane Labs.
-
Cryptomathic
-
Cybercash
-
CygnaCom Solutions, Inc.
- DataKey
-
DEC
SRC publications (Especially reports 125, 117, 83, 70, 67, 39.)
- Digicash.
- ECash.
- ecomsecurity.com
- En Garde Systems.
- EIT (Enterprise Integration Technology).
- Entrust Technologies
-
Exodus Communications
- F-Secure
- Firewall Security Corp.
- Frontier Technologies
- Global Technology Associates
- Globeset
- Guardent
- Harris Computer Systems
- Hewlett-Packard
- IBM T.J.Watson Network Security Group
- IBM Zurich Security Research Group
- IBM Security Overview
ICSA.net
- Internet Security Systems, Inc.
- KonaSoft
- Los Altos Technologies.
- Mach 5
(and their crypto page)
- Management Analytics
- Microsoft.
- Mondex
- Morning Star Technologies
- NEC security server
- NetChex
- Netegrity
- Netscape
- Netsys
- Network Associates
- NewGenPay
- Open Market.
- OpenNetwork Technologies.
- OpenTV.
- Odyssey Research Associates (Recluse
Web Security System)
-
PC Dynamics SafeHouse Encryption
- Plus Five Consulting, Inc.
- RedCreek
- RPK SecureMedia
- Rocksoft
-
RSA Security
- SAIC
(Science Applications International Corp.)
- Schlumberger Smart Cards (Cryptoflex for Windows 2000 Program)
- SECUDE GmbH
- Security Dynamics (Name changed to RSA Security)
- Secure Solutions Experts (SSE, a Siemens company)
- SecurityTracker
- Spyrus.
-
Steptoe and Johnson LLP
(Many papers on crypto policy and law; Stewart Baker works here;
see "Law and the Net"
here.
- SUN Microsystems.
Frequently Asked Questions -- Applet Security (from JavaSoft)
- Surety Technologies.
-
Telcordia (General),
Telcordia Security Products
- Ultimate Privacy
- VeriFone
- VeriSign
- Visa
- V-ONE
- Xcert
- Zaxus (formerly Racal Security and Payments)
- Zero Knowledge
University Sites and Course Material
Other Sites
Books and Publishers
-
Aegean Park Press
-
Applied Cryptography, by Bruce Schneier.
-
Chicago
Journal of Theoretical Computer Science
-
CRC Press
-
Cryptography: Theory and Practice, by Doug Stinson.
-
Firewalls and Internet Security:
Repelling the Wily Hacker, by Cheswick and Bellovin.
-
Foundations of Cryptography, by Oded Goldreich.
-
Handbook of Applied Cryptography, by Menezes, van Oorschot, and Vanstone.
-
Journal of Computer Security
-
Rethinking
Public Key Infrastructures and Digital Certificates Building in
Privacy, by Stefan Brands.
-
Secrets
and Lies: Digital Security in a Networked World, by Bruce
Schneier.
-
Securing Java, by McGraw and Felten.
-
Springer-Verlag Lecture Notes in Computer Science
News Groups, NewsLetters, and FAQ's
Alert Sites
People
(Limited to people with home pages relevant to crypto/security; very
incomplete...)
Kevin McCurley's list of cryptographer's home pages
- Abadi, Martin
- Agnew, Gordon
- Anderson, Ross
- Back, Adam
- Bellare, Mihir
- Berson, Tom
- Biham, Eli
- Blaze, Matt
- Bleichenbacher, Daniel
- Blum, Avrim
- Boneh, Dan
- Boyar, Joan
- Brassard, Gilles
- Brands, Stefan
- Chaum, David
- Camenisch, Jan
- Chor, Benny
- Crepeau, Claude
- Dai, Wei
- Davis, Don
- Denning, Dorothy
- Ding, Cunsheng
- Ellison, Carl M.
- Finney, Hal
- Froomkin, A. Michael
- Goldreich, Oded
- Goldwasser, Shafi
- Gutman, Peter
- Hastad, Johan
- Herzberg, Amir
- Hoffman, Lance
- Jakobsson, Markus
- Jim, Trevor
- Kaliski, Burton
- Klapper, Andy
- Knudsen, Lars
- Kocher, Paul
- LaMacchia, Brian
- Lenstra, Hendrik W., Jr.
- Mao, Wenbo
- Manasse, Mark
- Maurer, Ueli
- McCurley, Kevin
- Naor, Moni
- Neumann, Peter
- Odlyzko, Andrew
- Ostrovsky, Rafail
- Quisquater, Jean-Jacques
- Rabin, Michael
- Ritter, Terry
- Rivest, Ronald L.
- Rogaway, Phil
- Rudich, Steven
- Schiller, Jeff
- Schneier, Bruce
- Sherman, Alan
- Shostack, Adam
- Shoup, Victor
- Stern, Jacques
- Stiglic, Anton
- Stinson, Doug and
his book, Cryptography: Theory and Practice.
- Stubblebine, Stuart
- Tsiounis, Yiannis
- Tygar, Doug
- Vaudenay, Serge
- Wagner, David
- Yee, Bennet
Algorithms, Protocols, Etc.
Specific algorithms, protocols, etc.