Skip to main content
Web Encrypt
  • Index
  • Cryptography
    • Basic
    • Books
    • Basics
    • Alice and Bob
    • Crypto War
    • Cryptography
    • Strength
    • Random
    • RSA
    • SM2
    • SM9
    • ECC
    • Curve25519
    • DSA
    • DES
    • AES
    • Mode of Operation
    • Hash
    • Hash Securitry
    • SHA1
    • Tokenization
    • Cryptanalytics
    • Ring Signature
    • Blind Signature
    • Group Signature
    • Aggregate Signature
    • Hash-based Signature
    • Secret Sharing
    • Diffie–Hellman
    • Twisted Edwards Curve
    • Identity-based Encryption
    • Format-Preserving Encryption
    • Threshold Cryptography
    • White-Box Cryptography
    • Homomorphic Encryption
    • Zero-Knowledge Proofs
    • Secure Multi-Party Computation
    • Deterministic and Order-preserving Encryption
    • Crypto-shredding
    • Birthday-paradox
    • Formal Verification
    • ProVerif
    • Cryptography Software
    • Charm
    • Cryptol
    • SageMath
    • Other
    • Others
  • Standard
    • Basic
    • ASN.1
    • DRM
    • FIDO
    • TOTP
    • HPKP
    • ACME
    • LURK
    • KMIP
    • PKCE
    • DNSSEC
    • PKCS#11
    • DNS over TLS/HTTPS
    • Time-Stamp Protocol
    • Web and Identity
    • OpenID
    • Web Cryptography
    • Web Authentication
    • Credential Management
    • Unified Identity Authentication
    • Decentralized Identifiers
    • CBOR Object Signing and Encryption
    • Javascript Object Signing and Encryption
    • Application
    • Tor
    • Matrix
    • Messaging Layer Security (MLS)
    • Off-the-record Messaging (OTR)
    • OMEMO
    • SSL/TLS
    • S/MIME
    • OpenPGP
    • Autocrypt
    • Hardware
    • Root of Trust
    • Secure Element
    • Hardware Security Module
    • Trusted Platform Module
    • Trusted Execution Environment
    • Programming Language
    • Java Cryptography Architecture
    • X509
    • FIPS 140
    • ANSI X9.F.1
    • Standards
    • Others
    • saltpack
    • OpenPubkey
    • Message Crypto
    • Remote Key Attestation
  • Cheat Sheet
    • User Authentication
    • Password Storage
    • Password Management
    • Key Management
    • Database Encryption
    • Certificate Authority
    • BTC Address
    • Git Signature
  • Organization
    • Global Platform
    • PKI Consortium
    • Other Organizations
  • Tool
    • Networking
    • Nmap
    • OpenSSH
    • Supply Chain
    • Sigstore
    • Smart Card
    • OpenSC
    • Sign & Encrypt
    • Minisign
    • GnuPG
    • PGPdump
    • File Encryption
    • age
    • encpipe
    • git-crypt
    • miniLock
    • TrueCrypt
    • Cryptomator
    • Database Encryption
    • Acra
    • Communication
    • Signal
    • Session
    • Delta Chat
    • K-9 Mail
    • Key Management
    • Keytool
    • SoftHSM
    • Pass
    • Keybase
    • Bitwarden
    • KeePassX
    • OpenKeychain
    • SSL/TLS
    • Rustls
    • OpenSSL
    • Certbot
    • Misc
    • Secretive
    • Tools
  • Online Tool
    • ASN.1
    • FIDO
    • BitAddress
    • Wrap Wallet
    • SM2 Sample Crypt
    • SM2 Sample Sign
    • SM2 Sample Verify
    • ECDH Key Exchange
    • RSA Cryptography
    • Online PGP
    • Online Tools
    • Online Tools List
    • Third Party Online Tools
    • PGP Encrypt for Hatter
  • Misc
    • Articles
    • Articles
    • Black Tech
    • DNSChain
    • Blockchain
    • Post-Quantum
    • Anti-Ransomware
    • The Crypto Anarchist Manifesto
    • 10 Cryptography Mistakes Amateurs Make
    • 6 encryption mistakes that lead to data breaches
    • Others
    • 国密
    • Links
    • Problems
    • Cryptographer
    • Library
    • Resource
    • Glossary
  • ASN.1
  • Cryptography
  • Security
  • Guidelines
  • Researchers
  • Video
  • Reference

ASN.1

  • ASN.1/BER/DER编码子集入门指南
  • ASN.1 – Communication between Heterogeneous Systems
  • ASN.1 Complete
  • Overview of the Octet Encoding Rules (OER)
  • JSON Encoding Rules
  • ASN.1, A SCHEMA LANGUAGE FOR XML

Cryptography

  • 密码术语
  • Crypto Tutorial
  • RSAES-OAEP Encryption Scheme
  • 公钥密码技术
  • 可信计算密码支撑平台功能与接口规范
  • SM2椭圆曲线公钥密码算法
  • SM2椭圆曲线公钥密码算法推荐曲线参数
  • Handbook of Applied Cryptography
  • Everything you need to know about cryptography in 1 hour
  • Approved Security Functions for FIPS PUB 140-2, Security Requirements for Cryptographic Modules
  • ECC加密算法入门介绍
  • Keyczar: A Cryptographic Toolkit
  • A Graduate Course in Applied Cryptography

Security

  • 密码学与网络空间安全
  • Suite B Cryptography
  • NSA Suite B Crypto, Keys, and Side Channel Attacks
  • An archive of presentations by Trail of Bits

Guidelines

  • https://gist.github.com/grugq/353b6fc9b094d5700c70 - Simple Security Guidelines
  • https://blog.filippo.io/securing-a-travel-iphone/ - SECURING A TRAVEL IPHONE
  • http://www.daemonology.net/blog/2009-06-11-cryptographic-right-answers.html - Cryptographic Right Answers
  • https://gist.github.com/tqbf/be58d2d39690c3b366ad - Cryptographic Right Answers
  • https://github.com/freedomofpress/encryption-works/blob/master/encryption_works.md - Encryption Works

Researchers

  • Filippo Valsorda - @Cloudflare Crypto Team
    • https://keybase.io/filippo
    • https://github.com/FiloSottile Github Group Follows: FiloSottile
  • thaddeus t. grugq - Independent Security Researcher
    • https://keybase.io/grugq
    • https://github.com/grugq Github Group Follows: grugq
  • Adam Langley - @Google
    • https://github.com/agl Github Group Follows: agl
    • https://www.imperialviolet.org/
  • Matthew Green - @Johns Hopkins University
    • https://isi.jhu.edu/~mgreen/
    • https://blog.cryptographyengineering.com/

Video

  • http://open.163.com/special/Khan/moderncryptography.html - 可汗学院公开课:现代密码学

Reference

  1. http://www.oss.com/asn1/resources/books-whitepapers-pubs/asn1-books.html

Hatter Jiang, WebEncrypt.Org, My key: https://hatter.in/key, leave message here