Awesome List Updates on Nov 28, 2017
13 awesome lists updated today.
🏠 Home · 🔍 Search · 🔥 Feed · 📮 Subscribe · ❤️ Sponsor
1. Awesome Electron
Samples / Other
- Activity Monitor - Shows a doughnut chart of the CPU system, user, and idle activity time.
- Hash - Shows the hash values of entered text using different algorithms.
- Prices - Shows the current price of oil, gold, and silver using the Yahoo Finance API.
Documentation / Other
2. Awesome Crypto Papers
Introducing people to data security and cryptography / Simple: cryptography for non-engineers
- Keys under Doormats - Or why cryptography shouldn't be backdoored, by a all-star committee of crypto researches from around the world.
Introducing people to data security and cryptography / Brief introductions
- Using Encryption for Authentication in Large Networks - By Needham, Schroeder: this is were crypto-based auth starts.
Introducing people to data security and cryptography / General cryptographic interest
- Another Look at “Provable Security” - Inquiries into formalism and naive intuition behind security proofs, by Neal Koblitz et al.
Specific topics / Hashing
- FIPS 198-1: HMACs - The Keyed-Hash Message Authentication Code FIPS document.
- FIPS 202: SHA3 - SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions.
- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 - Security analysis of different legacy HMAC schemes by Jongsung Kim et al.
- On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit - Security of randomized CBC-MACs and a new construction that resists birthday paradox attacks and provably reaches full security, by E. Jaulmes et al.
Specific topics / Secret key cryptography
- List of proposed operation modes of AES - Maintained by NIST.
- Stick figure guide to AES - If stuff above was a bit hard or you're looking for a good laugh.
- Cache timing attacks on AES - Example of designing great practical attack on cipher implementation, by Daniel J. Bernstein.
- Salsa20 family of stream ciphers - Broad explanation of Salsa20 security cipher by Daniel J. Bernstein.
- AES submission document on Rijndael - Original Rijndael proposal by Joan Daemen and Vincent Rijmen.
Specific topics / Cryptanalysis
- Self-Study Course in Block Cipher Cryptanalysis - Attempt to organize the existing literature of block-cipher cryptanalysis in a way that students can use to learn cryptanalytic techniques and ways to break new algorithms, by Bruce Schneier.
- Statistical Cryptanalysis of Block Ciphers - By Pascal Junod.
Specific topics / Public key cryptography: General and DLP
- New Directions in Cryptography - Seminal paper by Diffie and Hellman, introducing public key cryptography and key exchange/agreement protocol.
- RFC 2631: Diffie-Hellman Key Agreement - An explanation of the Diffie-Hellman methon in more engineering terms.
- RSA Algorithm - Rather education explanation of every bit behind RSA.
- Remote timing attacks are practical - An example in attacking practical crypto implementationby D. Boneh, D. Brumley.
- The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited - by K. Bentahar.
Specific topics / Public key cryptography: Elliptic-curve crypto
- Elliptic Curve Cryptography: the serpentine course of a paradigm shift - Historic inquiry into development of ECC and it's adoption.
- Let's construct an elliptic curve: Introducing Crackpot2065 - Fine example of building up ECC from scratch.
- Explicit-Formulas Database - For many elliptic curve representation forms.
- Software implementation of the NIST elliptic curves over prime fields - Pracitcal example of implementing elliptic curve crypto, by M. Brown et al.
- High-speed high-security signatures - Seminal paper on EdDSA signatures on ed25519 curve by Daniel J. Bernstein et al.
Specific topics / Zero Knowledge Proofs
- Proofs that yield nothing but their validity and a Methodology of Cryptographic protocol design - By Goldreich, Micali and Wigderson, a relative to the above.
- A Survey of Zero-Knowledge Proofs with Applications to Cryptography - Great intro on original ZKP protocols.
Specific topics / Key Management
- Recommendation for Key Management – Part 1: General - Methodologically very relevant document on goals and procedures of key management.
Specific topics / Math
- PRIMES is in P - Unconditional deterministic polynomial-time algorithm that determines whether an input number is prime or composite.
Books / Post-quantum cryptography
- CrypTool book - Predominantly mathematically oriented information on learning, using and experimenting cryptographic procedures.
- The joy of Cryptography - By Mike Rosulek. A lot of basic stuff covered really well. No ECC.
- A Computational Introduction to Number Theory and Algebra - By Victor Shoup, excellent starters book on math universally used in cryptography.
3. Awesome Malware Analysis
Open Source Threat Intelligence / Other Resources
- OpenIOC - Framework for sharing threat intelligence.
Online Scanners and Sandboxes / Other Resources
- SEKOIA Dropper Analysis - Online dropper analysis (Js, VBScript, Microsoft Office, PDF).
File Carving / Other Resources
- hachoir3 (⭐593) - Hachoir is a Python library to view and edit a binary stream field by field.
Miscellaneous / Other Resources
- Malware Organiser (⭐0) - A simple tool to organise large malicious/benign files into a organised Structure.
4. Awesome Bigdata
Distributed Programming
- Baidu Bigflow - an interface that allows for writing distributed computing programs providing lots of simple, flexible, powerful APIs to easily handle data of any scale.
5. Awesome Indie
Communities / Other
- r/IndieBiz - A subreddit for small and independent businesses.
6. Awesome Vehicle Security
Miscellaneous / Episodes
- Arduino - Arduino boards have a number of shields you can attach to connect to CAN-enabled devices.
- CANdiy-Shield (⭐23)
- DFRobot CAN-BUS Shield For Arduino
- SparkFun CAN-BUS Shield
- arduino-canbus-monitor (⭐278) - No matter which shield is selected you will need your own sniffer. This is implementation of standard Lawicel/SLCAN protocol for Arduino + any MCP CAN Shield to use with many standard CAN bus analysis software packages or SocketCAN
7. Awesome Influxdb
Reference material
- InfluxDB in IoT world. Part 1: Introduction | Part 2: Hosting and scaling on AWS | Part 3: Plotting graphs using Grafana
8. Awesome Cpp
Graphics
- DirectXTK (⭐2.5k) - A collection of helper classes for writing DirectX 11.x code in C++. [MIT]
9. Awesome Algorithms
Websites
- The Sound of Sorting - The Sound of Sorting - "Audibilization" and Visualization of Sorting Algorithms
10. Awesome Vue
Resources / Books
- Front-end com Vue.js by Leonardo Vilarinho, Casa do Código. (November 2017)
11. Awesome Aws
Open Source Repos / Accompanying Repos
- aws-big-data-blog 🔥🔥🔥 (⭐894) - Samples from the AWS Big Data Blog.
12. Awesome Beacon
iBeacon for Developers
13. Awesome Ruby
CMS
- ComfortableMexicanSofa (⭐2.7k) - Powerful Rails 5.2+ CMS Engine.
- Prev: Nov 29, 2017
- Next: Nov 27, 2017