CRYPTOGRAPHY: Difference between revisions
From osint.info
Jump to navigationJump to search
Line 1: | Line 1: | ||
= Articles = | = Articles = | ||
== 2020 == | |||
{|border=1 | {|border=1 | ||
Line 8: | Line 10: | ||
|- | |- | ||
|20200221||nzz.ch||[https://www.nzz.ch/schweiz/welche-laender-fuer-500-millionen-franken-schweizer-krypto-technik-beschafften-trotz-hinweisen-auf-manipulationen-ld.1541135 Welche Länder für 500 Millionen Franken Schweizer Krypto-Technik beschafften – trotz Hinweisen auf Manipulationen]||[[CRYPTOGRAPHY]] / [[CH]] | |20200221||nzz.ch||[https://www.nzz.ch/schweiz/welche-laender-fuer-500-millionen-franken-schweizer-krypto-technik-beschafften-trotz-hinweisen-auf-manipulationen-ld.1541135 Welche Länder für 500 Millionen Franken Schweizer Krypto-Technik beschafften – trotz Hinweisen auf Manipulationen]||[[CRYPTOGRAPHY]] / [[CH]] | ||
|- | |||
|} | |||
== 2017 == | |||
{|border=1 | |||
|- | |||
|Date||Source||Title||Tags | |||
|- | |- | ||
|20170919||sueddeutsche.de||[http://www.sueddeutsche.de/digital/it-sicherheit-schwerwiegende-it-schwachstellen-koennten-offengelegt-werden-1.3673683 IT-Sicherheit: Regierung könnte ihr Hacker-Wissen offenlegen]||[[CRYPTOGRAPHY]] / [[DE]] | |20170919||sueddeutsche.de||[http://www.sueddeutsche.de/digital/it-sicherheit-schwerwiegende-it-schwachstellen-koennten-offengelegt-werden-1.3673683 IT-Sicherheit: Regierung könnte ihr Hacker-Wissen offenlegen]||[[CRYPTOGRAPHY]] / [[DE]] | ||
|- | |||
|} | |||
== 2016 == | |||
{|border=1 | |||
|- | |||
|Date||Source||Title||Tags | |||
|- | |- | ||
|20161123||blog.lukaszolejnik.com||[https://blog.lukaszolejnik.com/european-union-wants-to-regulate-cryptography/ European Union wants to regulate cryptography?]||[[CRYPTOGRAPHY]] | |20161123||blog.lukaszolejnik.com||[https://blog.lukaszolejnik.com/european-union-wants-to-regulate-cryptography/ European Union wants to regulate cryptography?]||[[CRYPTOGRAPHY]] | ||
Line 18: | Line 36: | ||
|- | |- | ||
|20160525||heise.de||[http://www.heise.de/newsticker/meldung/Crypto-Wars-3-0-Enisa-und-Europol-gegen-Hintertueren-bei-Verschluesselung-3218566.html Crypto Wars 3.0: Enisa und Europol gegen Hintertüren bei Verschlüsselung]||[[CRYPTOGRAPHY]] | |20160525||heise.de||[http://www.heise.de/newsticker/meldung/Crypto-Wars-3-0-Enisa-und-Europol-gegen-Hintertueren-bei-Verschluesselung-3218566.html Crypto Wars 3.0: Enisa und Europol gegen Hintertüren bei Verschlüsselung]||[[CRYPTOGRAPHY]] | ||
|- | |||
|} | |||
== 2014 == | |||
{|border=1 | |||
|- | |||
|Date||Source||Title||Tags | |||
|- | |- | ||
|20141116||scottaaronson.com||[http://www.scottaaronson.com/blog/?p=2059 What does the NSA think of academic cryptographers? Recently-declassified document provides clues]||[[CRYPTOGRAPHY]] / [[NSA]] | |20141116||scottaaronson.com||[http://www.scottaaronson.com/blog/?p=2059 What does the NSA think of academic cryptographers? Recently-declassified document provides clues]||[[CRYPTOGRAPHY]] / [[NSA]] | ||
|- | |- | ||
|20141107||medium.com||[https://medium.com/stanford-select/keeping-secrets-84a7697bf89f Keeping Secrets: Four decades ago, university researchers figured out the key to computer privacy, sparking a battle with the National Security Agency that continues today.]||[[CRYPTOGRAPHY]] / [[NSA]] | |20141107||medium.com||[https://medium.com/stanford-select/keeping-secrets-84a7697bf89f Keeping Secrets: Four decades ago, university researchers figured out the key to computer privacy, sparking a battle with the National Security Agency that continues today.]||[[CRYPTOGRAPHY]] / [[NSA]] | ||
|- | |||
|} | |||
== 2013 == | |||
{|border=1 | |||
|- | |||
|Date||Source||Title||Tags | |||
|- | |- | ||
|20130919||spiegel.de||[http://www.spiegel.de/netzwelt/web/kryptografie-hintertueren-die-nsa-generalschluessel-fuers-internet-a-922588.html NSA-Skandale: So funktionieren Kryptografie-Hintertüren]||[[CRYPTOGRAPHY]] | |20130919||spiegel.de||[http://www.spiegel.de/netzwelt/web/kryptografie-hintertueren-die-nsa-generalschluessel-fuers-internet-a-922588.html NSA-Skandale: So funktionieren Kryptografie-Hintertüren]||[[CRYPTOGRAPHY]] |
Revision as of 12:35, 6 December 2020
Articles
2020
Date | Source | Title | Tags |
20200918 | spiegel.de | Krypto-Dienst Tutanota Staatsanwaltschaft wollte Zugriff auf verschlüsselte E-Mails | TUTANOTA / CRYPTOGRAPHY |
20200221 | nzz.ch | Welche Länder für 500 Millionen Franken Schweizer Krypto-Technik beschafften – trotz Hinweisen auf Manipulationen | CRYPTOGRAPHY / CH |
2017
Date | Source | Title | Tags |
20170919 | sueddeutsche.de | IT-Sicherheit: Regierung könnte ihr Hacker-Wissen offenlegen | CRYPTOGRAPHY / DE |
2016
Date | Source | Title | Tags |
20161123 | blog.lukaszolejnik.com | European Union wants to regulate cryptography? | CRYPTOGRAPHY |
20161011 | arstechnica.com | NSA could put undetectable “trapdoors” in millions of crypto keys - Technique allows attackers to passively decrypt Diffie-Hellman protected data. | BACKDOORS / NSA / CRYPTOGRAPHY |
20160920 | spiegel.de | Quantenkryptografie Forscher teleportieren Signale durch Städte | CRYPTOGRAPHY |
20160525 | heise.de | Crypto Wars 3.0: Enisa und Europol gegen Hintertüren bei Verschlüsselung | CRYPTOGRAPHY |
2014
Date | Source | Title | Tags |
20141116 | scottaaronson.com | What does the NSA think of academic cryptographers? Recently-declassified document provides clues | CRYPTOGRAPHY / NSA |
20141107 | medium.com | Keeping Secrets: Four decades ago, university researchers figured out the key to computer privacy, sparking a battle with the National Security Agency that continues today. | CRYPTOGRAPHY / NSA |
2013
Books
Author | Issuer | Title | Published | ISBN | Tags |
SCHNEIER, BRUCE | Secret & Lies | CRYPTOGRAPHY | |||
STREHLER, RES | Werd Verlag | Verschlüsselt. Der Fall Hans Bühler. | 3-859-32141-2 | CRYPTOGRAPHY / CRYPTO AG / BUEHLER, HANS | |
HARRIS, ROBERT | Enigma | 1995 | 3-453-11593-7 | CRYPTOGRAPHY |
Resources
Source | Title | Tags |
scz.bplaced.net | MfS Abt. N: Chiffrierwesens der Deutschen Demokratischen Republik - Zielgerichtete Koordinierung der Informationsbeschaffung über das Chiffrierwesen des Feindes / Erarbeitung von Dekryptiermethoden etc. | DECRYPTION / CRYPTOGRAPHY / MFS |
scz.bplaced.net | T-311 SELEN Bündelchiffriergerät für PCM-30 | CRYPTOGRAPHY / MFS |
scz.bplaced.net | Chiffrierordnung des MfS 1956 - 1989 | CRYPTOGRAPHY / MFS |
scz.bplaced.net | Kompromittierung von Chiffrierverfahren durch MfS / KGB | CRYPTOGRAPHY / MFS |
scz.bplaced.net | http://scz.bplaced.net/m.html [Manuelle Chiffrierverfahren] | CRYPTOGRAPHY / MFS |
Talks
- Phil Rogaway - IACR Distinguised Lecture 2015 / The moral character of cryptographic work
- https://www.youtube.com/watch?v=F-XebcVSyJw
- https://www.iacr.org/publications/dl/ann2015.html