Article Archive
Articles that use to be prominently published or mirrored here that are now in an archived status.
- A
- Advanced SQL Injection In SQL Server Applications.pdf (291 KB)
- Advanced SQL Injection.pdf (190 KB)
- AES by Example.pdf (113 KB)
- AES Proposal Rijndael.pdf (1,019 KB)
- Analysis of Shamirs Factoring Device.pdf (196 KB)
- Anatomy of a Web Appliction Security Considerations.pdf (1 MB)
- Application Denial of Service DoS Attacks.pdf (112 KB)
- Asymmetric Encryption Evolution and Enhancements.pdf (209 KB)
- Auditing and Securing Web enabled Applications.pdf (53 KB)
- B
- Beejs Guide to Network Programming.pdf (721 KB)
- Block Ciphers by RSA labs.pdf (414 KB)
- Breaking DES.pdf (325 KB)
- C
- CAST 256 Encryption Algorithm.pdf (97 KB)
- Cookie Path Best Practice.pdf (80 KB)
- Cookie Poisoning.pdf (138 KB)
- Cost Based Security Analysis of Symmetric and Asymmetric Key Lengths.pdf (266 KB)
- Countermeasures against Buffer Overflow Attacks.pdf (135 KB)
- Cross Site Tracing XST.pdf (774 KB)
- cryptobytes index.pdf (69 KB)
- Cylink Corporations Submission for AES.pdf (189 KB)
- D
- Defending Against a Trojan Horse.pdf (46 KB)
- Development of the AES.pdf (383 KB)
- Divide and Conquer.pdf (290 KB)
- E
- Efficient Implementation of the Rijndael S box.pdf (120 KB)
- Elliptic Curve Cryptosystems.pdf (385 KB)
- Elliptic Curve DSA ECDSA.pdf (229 KB)
- elliptic_curve.pdf (31 KB)
- Exhaustive Search Exhausting.pdf (397 KB)
- Extensions and Revisions to PKCS 7.pdf (155 KB)
- F
- Factorization of RSA 140.pdf (164 KB)
- FAQs About Todays Cryptography v4 1.pdf (2 MB)
- FAQs About Todays Cryptography v4.pdf (1 MB)
- FAQs About Todays Cryptography.pdf (840 KB)
- Farewell to Data Loss Understanding Data Replication.pdf (87 KB)
- Fast Variants of RSA.pdf (433 KB)
- Fight Back Against Identity Theft.pdf (127 KB)
- Flaw in NTRU Signature Scheme NSS.pdf (29 KB)
- Foundations of Modern Cryptography.pdf (294 KB)
- H
- Hacking Internet Banking Applications.pdf (1 MB)
- High Speed RSA Implementation.pdf (498 KB)
- HMAP A Technique and Tool For Remote Identification of HTTP Servers.pdf (136 KB)
- How safe is your security software.pdf (37 KB)
- How To Prevent Data Loss.pdf (37 KB)
- HTTP Request Smuggling.pdf (170 KB)
- I
- Identity Theft A Quiz for Consumers.pdf (231 KB)
- Identity Theft If You Become a Victim.pdf (158 KB)
- Identity Theft The Aftermath.pdf (1 MB)
- Identity Theft Whats it all about.pdf (236 KB)
- IDTheftABATechShowbiblio.pdf (150 KB)
- IIS Security and Programming Countermeasures.pdf (4 MB)
- Impending Demise of RSA.pdf (358 KB)
- Improved Cryptanalysis of Rijndael.pdf (204 KB)
- Improving Web Application Security.pdf (7 MB)
- Internet Application Security.pdf (40 KB)
- Internet Identity Theft.pdf (62 KB)
- Introducing Advanced Encryption Standard AES.pdf (273 KB)
- Introduction to Database and Application Worms.pdf (156 KB)
- Introduction to the new AES Standard Rijndael.pdf (17 KB)
- J
- Java Security.pdf (76 KB)
- K
- L
- LDAP Injection and Blind LDAP injection.pdf (2 MB)
- LDAP Injection.pdf (519 KB)
- M
- Manipulating Microsoft SQL Server Using SQL Injection.pdf (116 KB)
- Minimal Symmetric Cupher Key Lengths.pdf (134 KB)
- Mitigating Insider Threats to RSA Key Generation.pdf (1 MB)
- N
- New Attacks on Cryptographic Devices.pdf (140 KB)
- Nomination of SAFER as Candidate Algorithm for AES.pdf (284 KB)
- NSS Cryptanalysis II The Return of The Keys.pdf (191 KB)
- P
- Password Based Cryptography.pdf (240 KB)
- Performance Comparison of Public Key Cryptosystems.pdf (459 KB)
- Polymorphic Shellcodes vs Application IDSs.pdf (273 KB)
- Preliminary Analysis of the BSAFE 3 x PRNG.pdf (337 KB)
- Proactive Security Long term Protection Against Break ins.pdf (280 KB)
- Proper Initialization for the BSAFE RNG.pdf (197 KB)
- Protecting Web Based Applications.pdf (232 KB)
- Protection Against Exploitation of Stack And Heap Overflows.pdf (39 KB)
- R
- Radio Frequency Identification Security Risks and Challenges.pdf (701 KB)
- Raising the Standard for RSA Signatures RSA PSS.pdf (134 KB)
- Recent Results for MD2 MD4 and MD5.pdf (230 KB)
- Recommendations on Elliptic Curve Cryptosystems.pdf (67 KB)
- Regulating Crypography.pdf (30 KB)
- Response to Weaknesses in RC4.pdf (67 KB)
- Results on PKCS 1 RSA Encryption Standard.pdf (224 KB)
- Results on Signature Forgery.pdf (199 KB)
- RSA and Daniel Bernsteins Paper.pdf (45 KB)
- RSA and Strong Primes.pdf (218 KB)
- RSA based Cryptographic Schemes.pdf (38 KB)
- RSA for Paranoids.pdf (314 KB)
- RSA Hardware Implementation.pdf (279 KB)
- RSA Laboratories Submits New AES Mode to NIST.pdf (87 KB)
- RSA Securitys Official Guide to Cryptogrphy.pdf (398 KB)
- S
- Secure Coding Practices for Microsoft NET Applications.pdf (64 KB)
- Secure Development Framework.pdf (335 KB)
- secure_scripting.pdf (83 KB)
- Security Basics A Whitepaper.pdf (31 KB)
- Security Estimates for 512 bit RSA.pdf (139 KB)
- Security in the Microsoft NET Framework.pdf (82 KB)
- Security of the OAEP Enhanced RSA Public Key Encryption Scheme.pdf (199 KB)
- Security of the RC5.pdf (442 KB)
- Selecting Cryptographic Key Sizes.pdf (438 KB)
- Serpent A Proposal for the AES.pdf (173 KB)
- Session Fixation Vulnerability.pdf (356 KB)
- Spring_2004_Cryptobytes.pdf (1 MB)
- Stopping Automated Attack Tools.pdf (205 KB)
- Stream Ciphers by RSA labs.pdf (295 KB)
- Suggestions for RNG in Software.pdf (262 KB)
- Survey of Two Signature Aggregation Techniques.pdf (412 KB)
- Synchronous Data Replication.pdf (494 KB)
- T
- TESLA Broadcast Authentication Protocol.pdf (1 MB)
- The Evolution of Cross Site Scripting Attacks.pdf (175 KB)
- The Future of Web Server Security.pdf (192 KB)
- The Laws of Cryptography with Java Code.pdf (1 MB)
- The Status of MD5 After a Recent Attack.pdf (348 KB)
- Threat Profiling Microsoft SQL Server.pdf (234 KB)
- Timing Attacks on Cryptosystems.pdf (199 KB)
- Trust Models and Management in Public Key Infrastructures.pdf (52 KB)
- TWIRL and RSA Key Size.pdf (146 KB)
- W
- Web Application Security Tips.pdf (1 MB)
- Web Application Security.pdf (103 KB)
- Web server security Securing dynamic Web content.pdf (69 KB)
- WEP Fix using RC4 Fast Packet Keying.pdf (70 KB)
- Why Cryptosystems Fail v2.pdf (1 MB)
- Why Cryptosystems Fail.pdf (214 KB)
- Wireless Security.pdf (591 KB)
- X
- XML Security.pdf (607 KB)