95fa7a6e093a297ef51a9cb77c7a14d381d959d9
[ach-master.git] / src / links.tex
1 \section{Links}
2 \label{section:Links}
3
4 %% NOTE: this should re restructured...
5
6 \begin{itemize}
7 \item IANA official list of Transport Layer Security (TLS) Parameters: \url{https://www.iana.org/assignments/tls-parameters/tls-parameters.txt}
8 \item Forward secrecy mit debian wheezy: postfix, dovecot, nginx: \url{https://www.incertum.net/archives/72-Forward-Secrecy-mit-Debianwheezy-postfix,-dovecot,-nginx.html}
9 \item SSL cipher settings: \url{http://www.skytale.net/blog/archives/22-SSL-cipher-setting.html}
10 \item Perfect Forward Secrecy mit Apple Mail: \url{http://www.kuketz-blog.de/perfect-forward-secrecy-mit-apple-mail/}
11 \item Perfect Forward Secrecy (PFS) f\"ur Postfix und Dovecot: \url{https://www.heinlein-support.de/blog/security/perfect-forward-secrecy-pfs-fur-postfix-und-dovecot/#more-1085}
12 \item Elliptic curves and their implementation (04 Dec 2010): \url{https://www.imperialviolet.org/2010/12/04/ecc.html}
13 \item A (relatively easy to understand) primer on elliptic curve cryptography: \url{http://arstechnica.com/security/2013/10/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography}
14 \item Duraconf, A collection of hardened configuration files for SSL/TLS services (Jake Applebaum's github): \url{https://github.com/ioerror/duraconf}
15 \item Attacks on SSL a comprehensive study of BEAST, CRIME, TIME, BREACH, LUCKY 13 \& RC4 Biases: \url{https://www.isecpartners.com/media/106031/ssl_attacks_survey.pdf}
16 \item EFF How to deploy HTTPS correctly: \url{https://www.eff.org/https-everywhere/deploying-https}
17 \item Bruce Almighty: Schneier preaches security to Linux faithful (on not recommending to use Blowfish anymore in favour of Twofish): \url{https://www.computerworld.com.au/article/46254/bruce_almighty_schneier_preaches_security_linux_faithful/?pp=3}
18 \item Implement FIPS 183-3 for DSA keys (1024bit constraint): \url{https://bugzilla.mindrot.org/show_bug.cgi?id=1647}
19 \item Elliptic Curve Cryptography in Practice: \url{http://eprint.iacr.org/2013/734.pdf}
20 \item Factoring as a Service: \url{http://crypto.2013.rump.cr.yp.to/981774ce07e51813fd4466612a78601b.pdf}
21 \item Black Ops of TCP/IP 2012: \url{http://dankaminsky.com/2012/08/06/bo2012/}
22 \item SSL and the Future of Authenticity, Moxie Marlinspike - Black Hat USA 2011: \url{http://www.youtube.com/watch?v=Z7Wl2FW2TcA}
23 \item enisa - Algorithms, Key Sizes and Parameters Report (Oct.'13) \url{http://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/algorithms-key-sizes-and-parameters-report}
24
25 \end{itemize}