- Cryptography Labs
- Online Books
- Journals
- Conferences
- Professional organizations
- Tools and Programming Libraries
- Cryptographic Standards
- Weblogs
- Other Links
United States:
- Carnegie Mellon University, CyLab
- Florida Atlantic University, Center for Cryptology and Information Security
- Florida State University, Center for Security & Assurance in IT
- George Mason University, Center for Secure Information Systems
- Georgia Tech, Georgia Tech Information Security Center
- John Hopkins University, Information Security Institute
- Massachusetts Institute of Technology, Cryptography and Information Security Group
- New York University, Cryptography Group
- Purdue University, Centre for Education and Research in Information Assurance and Security
- Stanford University, Applied Crypto Group,Security Lab
- University of California, Berkeley, Security Research Lab
- University of California, Davis, Computer Security Laboratory
- University of California, Irvine, Secure Computing & Networking Center
- University of California, Los Angeles, Center for Information and Computation Security
- University of California, San Diego, Security and Cryptography
- University of Illinois, Urbana-Champaign, Centre for Cryptography and Information Protection
- University of North Carolina at Charlotte, Department of Software and Information Systems
Canada:
- Carleton University, Computer Security Lab
- Concordia University, Concordia Security Laboratory
- McGill University, Crypto and Quantum Info Lab
- University of Calgary, Institute for Security, Privacy and Information Assurance
- University of Montreal, Laboratoire d’Informatique Theorique et Quantique
- University of Ottawa, Software Security Research Group
- University of Toronto, Laboratory for Geometry, Algebra, Number Theory and their IT Applications (Ganita)
- University of Waterloo, Centre for Applied Cryptographic Research, CrySP
Europe:
- Cambridge University (UK), Computer Security Group
- CWI (Netherlands), Cryptology & Information Security Group
- Claude Shannon Institute for Discrete Mathematics, Coding and Cryptography(Ireland)
- Darmstadt University of Technology (Germany), Center of Advanced Security Research Darmstadt
- Ecole Normale Superieure (France), Complexity and Cryptography Research Group
- Ecole Polytechnique (France), LIX Cryptography Group
- Ecole Polytechnique Federale de Lausanne (Switzerland), LASEC
- ETH (Switzerland), Information Security and Cryptography Research Group
- Katholieke Universiteit Leuven (Belgium), Computer Security and Industrial Cryptography
- Royal Holloway College (UK), Information Security Group
- Ruhr-Universitat Bochum (Germany), Chair for Embedded Security
- Technische Universiteit Eindhoven (Netherlands), Eindhoven Institute for the Protection of Systems and Information
- University of Aarhus (Denmark), The Cryptology Group
- University of Bristol (UK), Cryptography Group
- Universite Catholique de Louvain (Belgium), UCL Crypto Group
Asia and Oceania:
- Indian Statistical Institute (India), Cryptology Research Group
- Queensland University of Technology (Australia), Information Security Institute
- Nanyang Technological University (Singapore), Coding and Cryptography Research Group
- Handbook of Applied Cryptography
- Applied Cryptography
- Cryptography Theory and Practice
- Security Engineering
- Securing Java
- Practical Cryptography With Go
- Cryptography: An Introduction
- Hacking Secret Ciphers with Python
- Visual Cryptography and Its Applications
- Military Cryptanalysis
- The Laws of Cryptography
- Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
- A brief introduction of quantum cryptography for engineers
- Quantum Cryptography
- Coding Theory and Cryptography
- An introduction to Cryptography
- Lecture Notes on Cryptography
- Introduction to Modern Cryptography
- How PGP Works
- Modern Cryptography
- Cryptography in C and C++
IACR:
ACM:
Springer:
- Security and Cryptology
- Cryptography and Communications
- Designs, Codes and Cryptography
- International Journal of Information Security
- Applicable Algebra in Engineering, Communication and Computing
- Open Systems and Information Dynamics
- Journal of Cryptographic Engineering
- P-Adic Numbers, Ultrametric Analysis, and Applications
- Frontiers of Computer Science
- Computational Complexity
Elsevier:
- Computers & Security
- Journal of Algorithms in Cognition, Informatics and Logic
- Computer Fraud & Security
- Finite Fields and Their Applications
- Information Processing Letters
- Journal of Computer and System Sciences
- Physical Communication
- Journal of Number Theories
- Information and Computation
- Journal of Algebra
- Engineering Science and Technology, an International Journal
IEEE:
- IEEE Transactions on Information Forensics and Security
- IEEE Security and Privacy
- IEEE Transactions on Dependable and Secure Computing
Other:
- The ISC International Journal of Information Security
- Journal of Computer Security
- Journal of Discrete Mathematics and Cryptography
- International Journal of Information and Computer Security
- Journal of Mathematical Cryptology
- Journal of Theoretical Physics and Cryptography
- International Journal of Applied Cryptography
- IEE Proceedings – Information Security
- The Journal of Information System Security
- International Journal of Network Security
- Advanced Crypto Software Collection
- Crypto++ Library
- Pairing-Based Cryptography (PBC Library)
- Multiprecision Integer and Rational Arithmetic C/C++ Library (MIRACL)
- A Python-based framework for rapidly prototyping ‘research’ cryptosystems (CHARM)
- Java Pairing-Based Cryptography Library (JPBC)
- Networking and Cryptography library (NaCl)
- The Python Cryptography Toolkit (PyCrypto)
- The GNU Crypto project
- OpenSSL
- Bouncy Castle
- Cryptlib
NIST:
FIPS PUB 140-2 Annexes:
- Annex A: Approved Security Functions (Draft 01-04-2011)
- Annex B: Approved Protection Profiles (Draft 06-14-2007)
- Annex C: Approved Random Number Generators (Draft 11-22-2010)
- Annex D: Approved Key Establishment Techniques (Draft 01-04-2011)
- FIPS Publications
ISO/IEC:
- Verification of cryptographic protocols SO/IEC 29128:2011
- Authenticated encryption ISO/IEC 19772:2009
- Check character systems ISO/IEC 7064:2003
- Modes of operation for an n-bit block cipher ISO/IEC 10116:2006
- Modes of operation for an n-bit block cipher algorithm – Corrigendum ISO/IEC 10116/Cor1:2008
- Dynamic adaptive streaming over HTTP (DASH) ISO/IEC 23009-4:2013
- Traffic Message Channel ALERT C coding ISO 14819-6:2006
IEEE:
- Local and metropolitan area networks IEEE 802.1AEbn-2011
- Authenticated Encryption with Length Expansion for Storage Devices IEEE 1619.1-2007
- Wide-Block Encryption for Shared Storage Media IEEE Std 1619.2-2010
- Cryptographic Protection of Data on Block-Oriented Storage Devices IEEE Std 1619-2007
- Password-Based Public-Key Cryptographic Techniques IEEE 1363.2-2008
- Standard Specifications for Public Key Cryptography IEEE 1363-2000
- Public Key Cryptographic Techniques Based on Hard Problems over Lattices IEEE Std 1363.1-2008
- Security techniques – Signcryption ISO/IEC 29150:2011
ANSI:
- Key Establishment Using Integer Factorization Cryptography ANSI X9.44-2007
- Encryption and Cryptography Standards