Books on Cryptography in Java
Research Journals, Conferences, and Archives
U.S. Government Standards
Goutam Paul and Subhamoy Maitra. RC4 Stream Cipher and Its Variants. CRC Press, 2012.
Lars Knudsen and Matthew Robshaw. The Block Cipher Companion. Springer-Verlag, 2011.
William Stallings. Cryptography and Network Security: Principles and Practice. Prentice Hall, 2011.
Niels Ferguson, Bruce Schneier, and Tadayoshi Kohno. Cryptography Engineering: Design Principles and Practical Applications. Wiley Publishing, 2010.
Christof Paar and Jan Pelzl. Understanding Cryptography: A Textbook for Students and Practitioners. Springer-Verlag, 2010.
Antoine Joux. Algorithmic Cryptanalysis. Chapman & Hall/CRC, 2009.
Jonathan Katz and Yehuda Lindell. Introduction to Modern Cryptography. Chapman & Hall/CRC, 2008.
Christopher Swenson. Modern Cryptanalysis: Techniques for Advanced Code Breaking. John Wiley & Sons, 2008.
Henri Cohen and Gerhard Frey. Handbook of Elliptic and Hyperelliptic Curve Cryptography. Chapman & Hall/CRC, 2006.
Susan Loepp and William K. Wootters. Protecting Information: From Classical Error Correction to Quantum Cryptography. Cambridge University Press, 2006.
Douglas R. Stinson. Cryptography: Theory and Practice, 3rd Edition. Chapman & Hall/CRC, 2006.
Wade Trappe and Lawrence C. Washington. Foundations of Cryptography with Coding Theory, 2nd Edition. Prentice Hall, 2006.
Oded Goldreich. Foundations of Cryptography: Volume II Basic Applications. Cambridge University Press, 2004.
Darrel Hankerson, Alfred Menezes, and Scott Vanstone. Guide to Elliptic Curve Cryptography. Springer-Verlag, 2004.
Wenbo Mao. Modern Cryptography: Theory and Practice. Hewlett-Packard Company/Prentice Hall PTR, 2004.
Niels Ferguson and Bruce Schneier.
Wiley Publishing, 2003.
Charlie Kaufman, Radia Perlman, and Mike Speciner. Network Security: Private Communication in a Public World, Second Edition. Prentice Hall PTR, 2002.
Oded Goldreich. Foundations of Cryptography: Volume I Basic Tools. Cambridge University Press, 2001.
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone.
Handbook of Applied Cryptography.
CRC Press, 1997.
Free online version: http://www.cacr.math.uwaterloo.ca/hac/
Bruce Schneier. Applied Cryptography, 2nd Edition. John Wiley & Sons, 1996.
Jonathan Knudsen. Java Cryptography. O'Reilly & Associates, 1998.
The Java Tutorial. http://download.oracle.com/javase/tutorial
Java I/O Tutorial (including object serialization). http://download.oracle.com/javase/tutorial/essential/io/index.html
Java Concurrency Tutorial. http://download.oracle.com/javase/tutorial/essential/concurrency/index.html
Java Exceptions Tutorial. http://download.oracle.com/javase/tutorial/essential/exceptions/index.html
Java Networking Tutorial. http://download.oracle.com/javase/tutorial/networking/index.html
Java RMI Tutorial. http://download.oracle.com/javase/tutorial/rmi/index.html
Java 2 Standard Edition Software Development Kit Version 1.8.0 Documentation. http://download.oracle.com/javase/8/docs/
Java 2 Standard Edition Software Development Kit Version 1.8.0 API Specification. http://download.oracle.com/javase/8/docs/api/
The International Association for Cryptologic Research (IACR) website has much useful information. https://www.iacr.org/
Cryptology ePrint Archive [research paper preprints]. https://eprint.iacr.org/
(The full texts of all papers in the Cryptology ePrint Archive are available online for free. However, the site has only limited indexing. Try using Google's Advanced Search to search just that site.)
Cornell University Library arXiv.org [research paper preprints]. Main site: https://arxiv.org. Cryptography and Security section: https://arxiv.org/list/cs.CR/recent.
(The full texts of all arXiv.org papers are available online for free.)
Journal of Cryptographic Engineering [journal]
Journal of Cryptology [journal]
Advances in Cryptology -- ASIACRYPT [conference]
Advances in Cryptology -- AUSCRYPT [conference]
Advances in Cryptology -- CRYPTO [conference]
Advances in Cryptology -- EUROCRYPT [conference]
International Conference on Applied Cryptography and Network Security -- ACNS [conference]
International Workshop on Cryptographic Hardware and Embedded Systems -- CHES [conference]
International Workshop on Fast Software Encryption -- FSE [conference]
International Workshop on Selected Areas in Cryptography -- SAC [conference]
(The above IACR journals and conferences are indexed in the SpringerLink database. The RIT Library has electronic access to this database. The RIT Library might not have electronic access to all volumes. The RIT Library does have hard copies of some volumes; check the catalog. To get free electronic copies of articles not directly available, use the RIT Library's interlibrary loan service. Be aware that articles ordered through interlibrary loan can take several weeks to arrive.)
(Cryptologia is indexed at Taylor & Francis. On that web site you can browse tables of contents and look at abstracts for free, but you have to pay to download electronic copies of articles. The RIT Library has neither hard copies of nor electronic access to this journal. Use interlibrary loan if necessary.)
A self-study course in block-cipher cryptanalysis.
24(1):18-34, January 2000.
(Although now out-of-date, a nice starting point into the literature on block cipher cryptanalysis.)
Internet Engineering Task Force (IETF). http://www.ietf.org
IETF Requests for Comments (RFCs) -- Internet standards. http://www.ietf.org/rfc.html
Internet Assigned Numbers Authority (IANA). http://www.iana.org
Data Encryption Standard (DES). Federal Information Processing Standards Publication 46-3, October 25, 1999. http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197, November 26, 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
Morris Dworkin. Recommendation for block cipher modes of operation: methods and techniques. NIST Special Publication 800-38A, December 2001. http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf
Morris Dworkin. Recommendation for block cipher modes of operation: the CMAC mode for authentication. NIST Special Publication 800-38B, May 2005. http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf
Morris Dworkin. Recommendation for block cipher modes of operation: the CCM mode for authentication and confidentiality. NIST Special Publication 800-38C, May 2004. http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C_updated-July20_2007.pdf
Morris Dworkin. Recommendation for block cipher modes of operation: Galois/counter mode (GCM) and GMAC. NIST Special Publication 800-38D, November 2007. http://csrc.nist.gov/publications/nistpubs/800-38D/SP-800-38D.pdf
Secure Hash Standard (SHS). Federal Information Processing Standards Publication 180-3, October 2008. http://csrc.nist.gov/publications/fips/fips180-3/fips180-3_final.pdf
Digital Signature Standard (DSS). Federal Information Processing Standards Publication 186-3, June 2009. http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf
NIST Cryptographic Hash Algorithm Competition. http://csrc.nist.gov/groups/ST/hash/sha-3/index.html
A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, J. Dray, S. Vo, and L. Bassham. A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800-22, Revision 1a, April 2010. http://csrc.nist.gov/groups/ST/toolkit/rng/documents/SP800-22rev1a.pdf
MC Frontalot. "Secrets from the Future." http://www.frontalot.com/index.php/?page=lyrics&lyricid=41