{"id":27,"date":"2025-06-04T14:13:01","date_gmt":"2025-06-04T20:13:01","guid":{"rendered":"https:\/\/courses.cs.colostate.edu\/cs003\/?page_id=27"},"modified":"2025-08-26T14:27:10","modified_gmt":"2025-08-26T20:27:10","slug":"resources","status":"publish","type":"page","link":"https:\/\/courses.cs.colostate.edu\/cs356\/resources\/","title":{"rendered":"Resources"},"content":{"rendered":"\n<p>Links to some security related sites<br><br>&nbsp; Following are some pointers to other sites on the Internet that are involved in Computer Security related research or activities. Note that some these links may be outdated. These links have been provided here for information purposes only. It does not indicate any endorsement of the linked site by the instructor, or by CSU or any of its departments or affiliates.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><a><\/a>Security&nbsp; in Academia (Research and Courses)<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/www.dice.ucl.ac.be\/crypto\/crypto.html\">Catholic University of Louvain (UCL) Crypto Group<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.newton.cam.ac.uk\">Cambridge University<\/a>, <a href=\"http:\/\/www.cl.cam.ac.uk\/Research\/Security\">Cambridge University<\/a><\/li>\n\n\n\n<li>Carnegie Melon University\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/www.ini.cmu.edu\/netbill\/\">The NetBill Electronic Commerce Project<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.sei.cmu.edu\">The Software Engineering Institute (SEI)<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"http:\/\/www.math.clemson.edu\/faculty\/Gao\/MTHSC985\/M985.html\">Clemson University Introduction to Cryptography course by Shuhong Gao<\/a><\/li>\n\n\n\n<li><a href=\"ftp:\/\/ftp.dartmouth.edu\/pub\/security\/\">Dartmouth Security Tools<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.cs.duke.edu\/~jingmin\/cps2963.html\">Duke &#8211; Introduction to Cryptography course by Jingmin He<\/a><\/li>\n\n\n\n<li>George Mason University\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/www.isse.gmu.edu\/~csis\/index.html\">Center for Secure Information Systems<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.list.gmu.edu\">Laboratory for Information Security Technology<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"http:\/\/www.clark.net\/pub\/mitchb\/ee250.html\">George Washington University &#8211; Telecommunications Security course by John Pescatore<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.cc.gatech.edu\/classes\/cs8113e_96_winter\/\">Georgia Tech &#8211; Network Security course by Ken Calvert<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.iaik.tu-graz.ac.at\/\">Graz University of Technology: Institute for Applied Information Processing and Communications<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.cs.indiana.edu\/ripem\/dir.html\">Indiana University: (Riordan&#8217;s RIPEM page).<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.engin.umd.umich.edu\/~indrajit\/Industries involved in Security Research     AccessData     AT&amp;T:         FTP Server         Bell Labs         Crowds pages     Algorithmic Research     Atlantic Systems Group     Baltimore Technologies     Bellcore (General), Bellcore Security Products, and Betsi     BlueMoney     BroadVision     CertCo     CertiCom     Codex     Cohesive Systems     Computer Systems Consulting (CSC): CSC Security Gopher     Consensus Development     COST (Computer Security Technologies)     Cryptomathic     Cybercash     CygnaCom Solutions, Inc.     Cygnus Support and their Security brochure.Cryptography Export Control Archives.     Data Fellows Ltd.     DataKey     DEC SRC publications (Especially reports 125, 117, 83, 70, 67, 39.) Digital Secure Systems Index     Digicash.     En Garde Systems.     EIT (Enterprise Integration Technology).     Entrust Technologies     Firewall Security Corp.     First Virtual     Fronter Technologies     FSA Corporation     Global Technology Associates     Harris Computer Systems     Hewlett-Packard     IBM T.J.Watson Network Security Group     IBM Zurich Security Research Group     IBM SecureWay     Internet Security Systems, Inc.     Isolation Systems     Keywitness Canada     KonaSoft     Lockeed Martin Advanced Technology Labs (Cypris processor).     Los Altos Technologies.     Mach 5 (and their crypto page)     Management Analytics     Mastercard's Secure Electronic Payment Protocol     Microsoft.     Mondex     Morning Star Technologies     NEC security server     NetChex     Netscape     Open Market.     Odyssey Research Associates (Recluse Web Security System)     PC Dyanamics     NSC (Network Systems Corp.)     Quadralay Corporation. Crypto page     Racal (Data Group)     Raptor Systems markets firewalls and has a nice security library.     RedCreek     RPK Inc     Rocksoft     RSA Data Security         RSA Laboratories         RSA's Cryptography FAQ.         RSA's &quot;Sink Clipper&quot; T-Shirt offer         CryptoBytes     SAIC (Science Applications International Corp.)     SecureWare     Security Dynamics     Seven Locks Software, Inc.&quot;     Software and Systems Engineering Ltd (SSE)     Spry.     Spyglass. API spec     Steptoe and Johnson LLP (Many papers on crypto policy and law; Stewart Baker works here.)     SUN Microsystems.     Frequently Asked Questions -- Applet Security (from JavaSoft)     Surety Technologies.     Tansu (Telecom Australia)'s Computer and Network Security Reference Index.     Terisa Systems.     TimeStep Corp.     Terzcat Communications (Mike Scher, strange@tezcat.com): Security pages top level     Trusted Information Systems (TIS)    http:\/\/www.dsv.su.se\/research\/seclab\/seclab.html\">Laboratory for Computer Security and Security Informatics at Stockholm University<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/ciac.llnl.gov\/cstc\/\">Lawrence Livermore National Laboratory &#8211; Computer Security Technology Center<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.esat.kuleuven.ac.be\/cosic\/cosic.html\">Leuven EE Dept Crypto offerings<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/csrc.lse.ac.uk\/\">London School of Economics &#8211; Computer Security Research Center<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.cs.umbc.edu\/www\/crypto\/\">UMBC Security Technology Research Group (STRG)<\/a>, <a href=\"http:\/\/www.cs.umbc.edu\/igec\/\">UMBC Institute for Global Electronic Commerce (IGEC)<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.engin.umd.umich.edu\/~indrajit\/:\/\/web.mit.edu\/\">MIT<\/a>:\n<ul class=\"wp-block-list\">\n<li><a href=\"ftp:\/\/athena-dist.mit.edu\/pub\/ATHENA\">MIT&#8217;s Athena FTP Server<\/a> Kerberos, X, Usenix papers, etc.<\/li>\n\n\n\n<li>Hal Abelson&#8217;s course, <a href=\"http:\/\/swissnet.ai.mit.edu\/6805\">&#8220;Ethics and Law on the Electronic Frontier&#8221;<\/a><\/li>\n\n\n\n<li>Ron Rivest&#8217;s Fall 95 MIT course, <a href=\"http:\/\/theory.lcs.mit.edu\/~rosario\/6.915\/home.html\">&#8220;Computer and Network Security&#8221;<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"http:\/\/www.itd.nrl.navy.mil\/ITD\/5540\/\">Naval Research Laboratory<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.cs.nyu.edu\/~rubin\/fall95.ps.Z\">New York University<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.cs.purdue.edu\/coast\/coast.html\">Purdue COAST Project (Computer Operations, Audit and Security Tools)<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.dmi.ens.fr\/dmi\/equipes_dmi\/grecc\/index.html\">GRECC<\/a> (Group de Recherche en Complexite et Cryptographie) at the Ecole Normale Superieure in Paris.<\/li>\n\n\n\n<li><a href=\"http:\/\/www-ns.rutgers.edu\/www-security\/index.html\">Rutgers University Network Services page on World Wide Web Security<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.csl.sri.com\/\">SRI Computer Science Lab.<\/a><\/li>\n\n\n\n<li><a href=\"ftp:\/\/Net.Tamu.edu\/pub\/security\/TAMU\">Texas AMU security tools<\/a>.<\/li>\n\n\n\n<li><a href=\"http:\/\/seclab.cs.ucdavis.edu\/Security.html\">UC Davis Security Lab<\/a>.<\/li>\n\n\n\n<li><a href=\"http:\/\/www.iro.umontreal.ca\/labs\/theorique\/index_en.html\">University of Montreal<\/a>.<\/li>\n\n\n\n<li>University of New Mexico <a href=\"http:\/\/www.digicrime.com\/~mccurley\/course\/index.html\">Cryptology in Computing<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/nii.isi.edu\/gost-group\/\">University of Southern California (Information Sciences Institute; Global Operating Systems Technology (GOST) Group)<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.cs.uwm.edu\/~cccns\/\">University of Wisconsin, Milwaukee<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/ece.wpi.edu\/Research\/crypt.html\">Worchester Polytechnic<\/a><\/li>\n<\/ul>\n\n\n\n<p><a><\/a><strong>Industries involved in Security Research<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/www.accessdata.com\/\">AccessData<\/a><\/li>\n\n\n\n<li>AT&amp;T:\n<ul class=\"wp-block-list\">\n<li><a href=\"ftp:\/\/Research.att.com\/dist\/internet_security\">FTP Server<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.research.att.com\/#acc\">Bell Labs<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.research.att.com\/projects\/crowds\">Crowds pages<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"http:\/\/www.arx.com\">Algorithmic Research<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.asg.unb.ca\/\">Atlantic Systems Group<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.baltimore.ie\/\">Baltimore Technologies<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.bellcore.com\/\">Bellcore (General)<\/a>, <a href=\"http:\/\/www.bellcore.com\/SECURITY\/security.html\">Bellcore Security Products<\/a>, and <a href=\"http:\/\/info.bellcore.com\/BETSI\/betsi.html\">Betsi<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.bluemoney.com\">BlueMoney<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.broadvision.com\">BroadVision<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.certco.com\">CertCo<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.certicom.com\">CertiCom<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.thecodex.com\/\">Codex<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.cohesive.com\/\">Cohesive Systems<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.spy.org\/\">Computer Systems Consulting (CSC)<\/a>: <a href=\"gopher:\/\/spy.org\/\">CSC Security Gopher<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.consensus.com\/\">Consensus Development<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.cost.se\">COST (Computer Security Technologies)<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/cryptomathic.dk\/\">Cryptomathic<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.cybercash.com\">Cybercash<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.cygnacom.com\">CygnaCom Solutions, Inc.<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.cygnus.com\">Cygnus Support<\/a> and their <a href=\"http:\/\/www.cygnus.com\/data\/cns.html\">Security brochure.<\/a><a href=\"http:\/\/www.cygnus.com\/~gnu\/export.html\">Cryptography Export Control Archives<\/a>.<\/li>\n\n\n\n<li><a href=\"http:\/\/www.datafellows.fi\/\">Data Fellows Ltd.<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.datakey.com\">DataKey<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.research.digital.com\/SRC\/publications\/src-rr.html\">DEC SRC publications<\/a> (Especially reports 125, 117, 83, 70, 67, 39.) <a href=\"http:\/\/www.digital.com\/info\/key-secure-index.html\">Digital Secure Systems Index<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/digicash.support.nl\">Digicash<\/a>.<\/li>\n\n\n\n<li><a href=\"http:\/\/www.cec.wustl.edu\/~dmm2\/egs\/egs.html\">En Garde Systems<\/a>.<\/li>\n\n\n\n<li><a href=\"http:\/\/www.eit.com\/\">EIT (Enterprise Integration Technology)<\/a>.<\/li>\n\n\n\n<li><a href=\"http:\/\/www.entrust.com\/\">Entrust Technologies<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.frus.com\/\">Firewall Security Corp.<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.fv.com\/\">First Virtual<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.frontiertech.com\">Fronter Technologies<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.fsa.ca\">FSA Corporation<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.gta.com\/index.html\">Global Technology Associates<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.hcsc.com\/\">Harris Computer Systems<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.hp.com\">Hewlett-Packard<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.research.ibm.com\/watson-netsec\">IBM T.J.Watson Network Security Group<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.zurich.ibm.com\/Technology\/Security\/\">IBM Zurich Security Research Group<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.ibm.com\/security\/\">IBM SecureWay<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/iss.net\/iss\/\">Internet Security Systems, Inc.<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.isolation.com\">Isolation Systems<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.keywitness.ca\">Keywitness Canada<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.konasoft.com\">KonaSoft<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/192.35.37.25\/cypris\/\">Lockeed Martin Advanced Technology Labs<\/a> (Cypris processor).<\/li>\n\n\n\n<li><a href=\"http:\/\/www.lat.com\">Los Altos Technologies<\/a>.<\/li>\n\n\n\n<li><a href=\"http:\/\/www.mach5.com\">Mach 5<\/a> (and their <a href=\"http:\/\/www.mach5.com\/crypto\/\">crypto page<\/a>)<\/li>\n\n\n\n<li><a href=\"http:\/\/all.net\/\">Management Analytics<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.mastercard.com\/Sepp\/sepptoc.htm\">Mastercard&#8217;s Secure Electronic Payment Protocol<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.microsoft.com\">Microsoft<\/a>.<\/li>\n\n\n\n<li><a href=\"http:\/\/www.mondex.com\/mondex\/home.htm\">Mondex<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.morningstar.com\/\">Morning Star Technologies<\/a><\/li>\n\n\n\n<li><a href=\"ftp:\/\/ftp.inoc.dl.nec.com\/pub\/security\">NEC security server<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.netchex.com\/index.html\">NetChex<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/home.netscape.com\/\">Netscape<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.openmarket.com\/\">Open Market<\/a>.<\/li>\n\n\n\n<li><a href=\"http:\/\/www.recluse.com\">Odyssey Research Associates (Recluse Web Security System)<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.pcdynamics.com\/SafeHouse\/\">PC Dyanamics<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.network.com\/NetworkSystems\/ProductLiterature\/DPF\/ProductSpec\/ProductSpec.html\">NSC (Network Systems Corp.)<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.quadralay.com\/home.html\">Quadralay Corporation<\/a>. <a href=\"http:\/\/www.quadralay.com\/www\/Crypt\/Crypt.html\">Crypto page<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.racal.com\/rdg\/\">Racal (Data Group)<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.raptor.com\/\">Raptor Systems<\/a> markets firewalls and has a nice <a href=\"http:\/\/www.raptor.com\/library\/library.html\">security library.<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.redcreek.com\">RedCreek<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.rpk\/co.nz\">RPK Inc<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.rocksoft.com\/\">Rocksoft<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.rsa.com\">RSA Data Security<\/a>\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/www.rsa.com\/rsalabs\">RSA Laboratories<\/a><\/li>\n\n\n\n<li>RSA&#8217;s <a href=\"http:\/\/www.rsa.com\/rsalabs\/faq\/faq_home.html\">Cryptography FAQ<\/a>.<\/li>\n\n\n\n<li>RSA&#8217;s <a href=\"http:\/\/www.rsa.com\/rsa\/ClipShip.html\">&#8220;Sink Clipper&#8221; T-Shirt offer<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.rsa.com\/rsalabs\/cryptobytes\/\">CryptoBytes<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"http:\/\/mls.saic.com\/\">SAIC (Science Applications International Corp.)<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.secureware.com\">SecureWare<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.securid.com\">Security Dynamics<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.sevenlocks.com\/SecurityDigest.htm\">Seven Locks Software, Inc.&#8221;<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.sse.ie\/security.html\">Software and Systems Engineering Ltd (SSE)<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.spry.com\/\">Spry<\/a>.<\/li>\n\n\n\n<li><a href=\"http:\/\/www.spyglass.com\/\">Spyglass<\/a>. <a href=\"http:\/\/www.spyglass.com\/techspec\/spm_spec.html\">API spec<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.us.net\/~steptoe\">Steptoe and Johnson LLP<\/a> (Many papers on crypto policy and law; Stewart Baker works here.)<\/li>\n\n\n\n<li><a href=\"http:\/\/www.sun.com\">SUN Microsystems<\/a>.<\/li>\n\n\n\n<li><a href=\"http:\/\/www.surety.com\">Surety Technologies.<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.tansu.com.au\/Info\/security.html\">Tansu (Telecom Australia)&#8217;s Computer and Network Security Reference Index<\/a>.<\/li>\n\n\n\n<li><a href=\"http:\/\/www.terisa.com\/\">Terisa Systems<\/a>.<\/li>\n\n\n\n<li><a href=\"http:\/\/www.timestep.com\/\">TimeStep Corp<\/a>.<\/li>\n\n\n\n<li><a href=\"http:\/\/www.tezcat.com\/web\/security\/security_top_level.html\">Terzcat Communications (Mike Scher, strange@tezcat.com): Security pages top level<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.tis.com\/\">Trusted Information Systems (TIS)<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.ultimateprivacy.com\">Ultimate Privacy<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.verifone.com\">VeriFone<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.verisign.com\">VeriSign<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.viacrypt.com\">ViaCrypt<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/infobase.internex.net\/visa\/\">Visa<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.v-one.com\/\">V-ONE<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.xcert.com\/\">Xcert<\/a><\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><a><\/a>Government Sources<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/www.cesg.gov.uk\">CESG: Communications-Electronic Security Group (in U.K.)<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.darpa.mil\">DARPA<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.fbi.gov\">FBI<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.alw.nih.gov\/Security\/security.html\">NIH (National Institutes of Health) page on Unix Security<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.nist.gov\/\">NIST (National Institute of Standards and Technology)<\/a>\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/www.ncsl.nist.gov\">Computer Systems Laboratory<\/a>.<\/li>\n\n\n\n<li><a href=\"http:\/\/csrc.nist.gov\">Computer Security Resource Clearinghouse<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.nist.gov\/aes\">AES (Advanced Encryption Standard) page<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"http:\/\/www2.nas.edu\/cstbweb\/\">NRC<\/a> (National Research Council; Computer Science and Telecommunications Board)\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/www2.nas.edu\/cstbweb\/28e2.html\">Their excellent study on cryptographic policy<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"http:\/\/www.nsa.gov:8080\/\">NSA<\/a> (National Security Agency)<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><a><\/a>Technical Societies and other Non-Profit Organizations<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/www.abanet.org\/scitech\/ec\/isc\/dsg-toc.html\">ABA<\/a> (American Bar Association; Electronic Commerce and Information Technology Division; Digital Signature Guidelines)<\/li>\n\n\n\n<li><a href=\"http:\/\/www.acm.org\">ACM (Association for Computing Machinery)<\/a>\n<ul class=\"wp-block-list\">\n<li>Their report: <a href=\"http:\/\/info.acm.org\/reports\/acm_crypto_study.html\">Codes, Keys, and Conflicts: Issues in U.S. Crypto Policy<\/a> (1994).<\/li>\n\n\n\n<li><a href=\"gopher:\/\/gopher.acm.org\/11[the_files.sig_forums.sigsac]\">ACM Security, Audit &amp; Control (SIGSAC)<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"http:\/\/www.ansi.org\/\">ANSI<\/a> (American National Standards Institute)<\/li>\n\n\n\n<li><a href=\"http:\/\/www.bsa.org\">BSA<\/a> (Business Software Alliance)<\/li>\n\n\n\n<li><a href=\"http:\/\/www.cdt.org\/\">CDT<\/a> (Center for Democracy and Technology<\/li>\n\n\n\n<li><a href=\"http:\/\/www.commerce.net\/\">Commerce Net<\/a><\/li>\n\n\n\n<li><a href=\"gopher:\/\/gopher.cpsr.org\/\">CPSR<\/a> (Computer Professionals for Social Responsibility).<\/li>\n\n\n\n<li><a href=\"http:\/\/www.eff.org\/\">EFF<\/a> (Electronic Frontier Foundation).<\/li>\n\n\n\n<li><a href=\"http:\/\/www.epic.org\">EPIC<\/a> (Electronic Privacy Information Center).<\/li>\n\n\n\n<li><a href=\"http:\/\/www.crypto.com\">Encryption Policy Resource Page<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.gip.org\">Global Internet Project<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.iacr.org\/~iacr\">IACR<\/a> (International Association for Cryptologic Research).<\/li>\n\n\n\n<li><a href=\"http:\/\/www.itd.nrl.navy.mil\/ITD\/5540\/ieee\">IEEE Computer Society on Security and Privacy<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.ifip.tu-graz.ac.at\/TC11\/\">IFIP Technical Committee on Security and Protection in Information Systems<\/a>\n<ul class=\"wp-block-list\">\n<li>\u00a0<a href=\"http:\/\/www.cs.rpi.edu\/ifip\/\">IFIP WG 11.3 Database Security<\/a><\/li>\n\n\n\n<li>\u00a0<a href=\"http:\/\/www.cs.purdue.edu\/homes\/spaf\/ifip11.4.html\">IFIP WG 11.4 Network Security<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"http:\/\/stdsbbs.ieee.org\/groups\/1363\/index.html\">IEEE P1363 standards committee<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.privacy.org\">Internet Privacy Coalition<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/info.isoc.org\/\">Internet Society<\/a>\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/bs.mit.edu:8001\/ipra.html\">Internet PCA Registration Authority<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.cs.arizona.edu\/xkernel\/www\/ipsec\/ipsec.html\">IPSEC web page<\/a><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"http:\/\/www.kra.org\">Key Recovery Alliance<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.ncsa.com\/\">NCSA<\/a> (National Computer Security Association)<\/li>\n\n\n\n<li><a href=\"http:\/\/www.privacy.org\/pi\/activities\/idcard\/\">Privacy International<\/a> (Material on ID cards)<\/li>\n\n\n\n<li><a href=\"http:\/\/www.usenix.org\">USENIX<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.engin.umd.umich.edu\/~indrajit\/www.vtw.org\">Voters Telecommunications Watch (VTW)<\/a><\/li>\n<\/ul>\n\n\n\n<p><a><\/a><strong>Bibliographies<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/mnementh.cs.adfa.oz.au\/htbin\/bib_lpb\">Lawrie Brown&#8217;s (searchable) cryptography bibliography<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.swcp.com\/~iacr\/proceedings\/alldata_byname.html\">IACR Conference Proceedings, by Author Name<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.cs.waikato.ac.nz\/~sirvine\">Sean Irvine&#8217;s collection<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.swcp.com\/~iacr\/jofc\/jofc.html\">Journal of Cryptology bibliography and table of contents<\/a> (from IACR).<\/li>\n\n\n\n<li><a href=\"ftp:\/\/www.cs.sandia.gov\/pub\/papers\/mccurley\/open.bib.Z\">Kevin McCurley&#8217;s bibliography on computational number theory<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.itribe.net\/CTRS\/\">Itribe (Cryptography Technical Report Server)<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.iro.umontreal.ca\/people\/crepeau\/Biblio-QC.html\">Quantum Computing Bibliography<\/a> from <a href=\"http:\/\/www.iro.umontreal.ca\/labs\/theorique\/index_en.html\">University of Montreal<\/a>.<\/li>\n\n\n\n<li><a href=\"http:\/\/theory.lcs.mit.edu\/~rivest\/crypto.bib\">Ron Rivest&#8217;s Crypto and Security bibliography (Bibtex)<\/a>.<\/li>\n\n\n\n<li><a href=\"http:\/\/theory.lcs.mit.edu\/~dmjones\/hbp\/\">CS bibliographies, including STOC and FOCS<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/bibd.unl.edu\/~stinson\/acbib.html\">Doug Stinson&#8217;s bibliography on authentication codes<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/bibd.unl.edu\/~stinson\/ssbib.html\">Doug Stinson&#8217;s bibliography on secret sharing schemes<\/a><\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><a><\/a>News Groups, NewsLetters, and FAQ&#8217;s<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/www.well.com\/user\/abacard\/remail.html\">Anonymous remailer FAQ<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.itd.nrl.navy.mil\/ITD\/5540\/ieee\/cipher\/\">Cipher<\/a>, the newsletter of the Technical Committee on Security and Privacy of the Computer Society of the IEEE. Their <a href=\"http:\/\/www.itd.nrl.navy.mil\/ITD\/5540\/ieee\/cipher\/cipher-hypercalendar.html\">calendar of upcoming events.<\/a><\/li>\n\n\n\n<li><a href=\"news:sci.crypt\">sci.crypt<\/a><a href=\"http:\/\/www4.ncsu.edu\/eos\/users\/w\/wsetzer\/www\/FAQ\/\">(FAQ)<\/a><\/li>\n\n\n\n<li><a href=\"news:sci.crypt.research\">sci.crypt.research<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.hks.net\">Hell&#8217;s Kitchen Software (Coderpunks archives)<\/a><\/li>\n\n\n\n<li><a href=\"news:talk.politics.crypto\">talk.politics.crypto<\/a><\/li>\n\n\n\n<li><a href=\"news:comp.security.misc\">comp.security.misc<\/a><a href=\"ftp:\/\/bloom-picayune.mit.edu\/pub\/usenet-by-group\/comp.security.missc\/\">(FAQ)<\/a><a href=\"ftp:\/\/ftp.uni-paderborn.de\/doc\/FAQ\/comp.security.misc\/\">(FAQ)<\/a><a href=\"ftp:\/\/grasp1.univ-lyon1.fr\/pub\/faq-by-newsgroup\/pub\/faq-by-newsgroup\/comp\/comp.security.misc\/alt-security-faq\">(FAQ)<\/a><\/li>\n\n\n\n<li><a href=\"news:alt.security\">alt.security<\/a><a href=\"ftp:\/\/bloom-picayune.mit.edu\/pub\/usenet-by-group\/alt.security\/\">(FAQ) <\/a><a href=\"ftp:\/\/grasp1.univ-lyon1.fr\/pub\/faq-by-newsgroup\/alt\/alt.security\/alt-security-faq\">(FAQ)<\/a><\/li>\n\n\n\n<li><a href=\"news:comp.security.announce\">comp.security.announce<\/a><\/li>\n\n\n\n<li><a href=\"news:sura.security\">sura.security<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.research.att.com\/www-buyinfo\/\">WWW-buyinfo<\/a><\/li>\n\n\n\n<li><a href=\"news:alt.security.pgp\">alt.security.pgp<\/a><a href=\"ftp:\/\/ftp.uni-paderborn.de\/doc\/FAQ\/alt.security.pgp\/\">(FAQ)<\/a><\/li>\n\n\n\n<li><a href=\"news:alt.security.keydist\">alt.security.keydist<\/a><\/li>\n\n\n\n<li><a href=\"news:alt.security.ripem\">alt.security.ripem<\/a><a href=\"ftp:\/\/ftp.uni-paderborn.de\/doc\/FAQ\/alt.security.ripem\/\">(FAQ)<\/a><\/li>\n\n\n\n<li><a href=\"news:comp.security.unix\">comp.security.unix<\/a><a href=\"ftp:\/\/bloom-picayune.mit.edu\/pub\/usenet-by-group\/comp.security.unix\/\">(FAQ)<\/a><a href=\"ftp:\/\/ftp.uni-paderborn.de\/doc\/FAQ\/comp.security.unix\/\">(FAQ)<\/a><\/li>\n\n\n\n<li><a href=\"news:comp.protocols.kerberos\">comp.protocols.kerberos<\/a><\/li>\n\n\n\n<li><a href=\"news:comp.virus\">comp.virus<\/a><a href=\"ftp:\/\/bloom-picayune.mit.edu\/pub\/usenet-by-group\/comp.virus\/\">(FAQ)<\/a><\/li>\n\n\n\n<li><a href=\"news:comp.risks\">comp.risks<\/a><\/li>\n\n\n\n<li><a href=\"ftp:\/\/ftp.uni-paderborn.de\/doc\/FAQ\/alt.security\/\">FAQ for alt.security.misc<\/a><\/li>\n\n\n\n<li><a href=\"ftp:\/\/ftp.tis.com\/pub\/firewalls\/faq.current\">FAQ for Firewalls<\/a><\/li>\n\n\n\n<li><a href=\"ftp:\/\/ftp.tis.com\/pub\/PEM\/FAQ\">FAQ for Privacy Enhanced Mail (PEM)<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.cis.ohio-state.edu\/hypertext\/faq\/usenet\/cryptography-faq\/top.html\">Cryptography FAQ<\/a><\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><a><\/a>Alert Sites<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"ftp:\/\/irbis.llnl.gov\/pub\/ciac\/secdocs\/nasa\">NASIRC &#8211; NASA Automated Systems Incident Response Capability<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.sei.cmu.edu\/SEI\/programs\/cert.html\">CERT (Computer Emergency Response Center at CMU)<\/a> and <a href=\"ftp:\/\/irbis.llnl.gov\/pub\/ciac\/secdocs\/assist\">ASSIST &#8211; Automated Systems Security Incident Support Team<\/a><\/li>\n\n\n\n<li><a href=\"ftp:\/\/irbis.llnl.gov\/pub\/ciac\/secdocs\/ddn\">DDN &#8211; DEFENSE DATA NETWORK<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.cert.dfn.de\/eng\/\">German DFN-CERT<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/ciac.llnl.gov\/\">CIAC (Computer Incident Advisory Capability (DOE\/LLNL)<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/csrc.ncsl.nist.gov\/first\/\">FIRST &#8211; Forum of Incident Response and Security Teams<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cs.colostate.edu\/~cs356\/pages\/resources.html#Instructor\">AUSERT &#8211; Australian Security Emergency Response Team<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Links to some security related sites &nbsp; Following are some pointers to other sites on the Internet that are involved in Computer Security related research or activities. Note that some these links may be outdated. These links have been provided here for information purposes only. It does not indicate any endorsement of the linked site [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-fullwidth.php","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","footnotes":""},"class_list":["post-27","page","type-page","status-publish","hentry","post-preview"],"taxonomy_info":[],"featured_image_src_large":false,"author_info":{"display_name":"admin","author_link":"https:\/\/courses.cs.colostate.edu\/cs356\/author\/admin_41g0qmxe\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/courses.cs.colostate.edu\/cs356\/wp-json\/wp\/v2\/pages\/27","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.cs.colostate.edu\/cs356\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/courses.cs.colostate.edu\/cs356\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/courses.cs.colostate.edu\/cs356\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/courses.cs.colostate.edu\/cs356\/wp-json\/wp\/v2\/comments?post=27"}],"version-history":[{"count":3,"href":"https:\/\/courses.cs.colostate.edu\/cs356\/wp-json\/wp\/v2\/pages\/27\/revisions"}],"predecessor-version":[{"id":80,"href":"https:\/\/courses.cs.colostate.edu\/cs356\/wp-json\/wp\/v2\/pages\/27\/revisions\/80"}],"wp:attachment":[{"href":"https:\/\/courses.cs.colostate.edu\/cs356\/wp-json\/wp\/v2\/media?parent=27"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}