# Awesome List Updates on Nov 28, 2017

13 awesome lists updated today.

🏠 Home · 🔍 Search · 🔥 Feed · 📮 Subscribe · ❤️ Sponsor

## 1. Awesome Electron

Samples / Other

- Activity Monitor - Shows a doughnut chart of the CPU system, user, and idle activity time.

- Hash - Shows the hash values of entered text using different algorithms.

- Prices - Shows the current price of oil, gold, and silver using the Yahoo Finance API.

Documentation / Other

## 2. Awesome Crypto Papers

Introducing people to data security and cryptography / Simple: cryptography for non-engineers

- Keys under Doormats - Or why cryptography shouldn't be backdoored, by a all-star committee of crypto researches from around the world.

Introducing people to data security and cryptography / Brief introductions

- Using Encryption for Authentication in Large Networks - By Needham, Schroeder: this is were crypto-based auth starts.

Introducing people to data security and cryptography / General cryptographic interest

- Another Look at “Provable Security” - Inquiries into formalism and naive intuition behind security proofs, by Neal Koblitz et al.

Specific topics / Hashing

- FIPS 198-1: HMACs - The Keyed-Hash Message Authentication Code FIPS document.

- FIPS 202: SHA3 - SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions.

- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 - Security analysis of different legacy HMAC schemes by Jongsung Kim et al.

- On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit - Security of randomized CBC-MACs and a new construction that resists birthday paradox attacks and provably reaches full security, by E. Jaulmes et al.

Specific topics / Secret key cryptography

- List of proposed operation modes of AES - Maintained by NIST.

- Stick figure guide to AES - If stuff above was a bit hard or you're looking for a good laugh.

- Cache timing attacks on AES - Example of designing great practical attack on cipher implementation, by Daniel J. Bernstein.

- Salsa20 family of stream ciphers - Broad explanation of Salsa20 security cipher by Daniel J. Bernstein.

- AES submission document on Rijndael - Original Rijndael proposal by Joan Daemen and Vincent Rijmen.

Specific topics / Cryptanalysis

- Self-Study Course in Block Cipher Cryptanalysis - Attempt to organize the existing literature of block-cipher cryptanalysis in a way that students can use to learn cryptanalytic techniques and ways to break new algorithms, by Bruce Schneier.

- Statistical Cryptanalysis of Block Ciphers - By Pascal Junod.

Specific topics / Public key cryptography: General and DLP

- New Directions in Cryptography - Seminal paper by Diffie and Hellman, introducing public key cryptography and key exchange/agreement protocol.

- RFC 2631: Diffie-Hellman Key Agreement - An explanation of the Diffie-Hellman methon in more engineering terms.

- RSA Algorithm - Rather education explanation of every bit behind RSA.

- Remote timing attacks are practical - An example in attacking practical crypto implementationby D. Boneh, D. Brumley.

- The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited - by K. Bentahar.

Specific topics / Public key cryptography: Elliptic-curve crypto

- Elliptic Curve Cryptography: the serpentine course of a paradigm shift - Historic inquiry into development of ECC and it's adoption.

- Let's construct an elliptic curve: Introducing Crackpot2065 - Fine example of building up ECC from scratch.

- Explicit-Formulas Database - For many elliptic curve representation forms.

- Software implementation of the NIST elliptic curves over prime fields - Pracitcal example of implementing elliptic curve crypto, by M. Brown et al.

- High-speed high-security signatures - Seminal paper on EdDSA signatures on ed25519 curve by Daniel J. Bernstein et al.

Specific topics / Zero Knowledge Proofs

- Proofs that yield nothing but their validity and a Methodology of Cryptographic protocol design - By Goldreich, Micali and Wigderson, a relative to the above.

- A Survey of Zero-Knowledge Proofs with Applications to Cryptography - Great intro on original ZKP protocols.

Specific topics / Key Management

- Recommendation for Key Management – Part 1: General - Methodologically very relevant document on goals and procedures of key management.

Specific topics / Math

- PRIMES is in P - Unconditional deterministic polynomial-time algorithm that determines whether an input number is prime or composite.

Books / Post-quantum cryptography

- CrypTool book - Predominantly mathematically oriented information on learning, using and experimenting cryptographic procedures.

- The joy of Cryptography - By Mike Rosulek. A lot of basic stuff covered really well. No ECC.

- A Computational Introduction to Number Theory and Algebra - By Victor Shoup, excellent starters book on math universally used in cryptography.

## 3. Awesome Malware Analysis

Open Source Threat Intelligence / Other Resources

- OpenIOC - Framework for sharing threat intelligence.

Online Scanners and Sandboxes / Other Resources

- SEKOIA Dropper Analysis - Online dropper analysis (Js, VBScript, Microsoft Office, PDF).

File Carving / Other Resources

- hachoir3 (⭐586) - Hachoir is a Python library to view and edit a binary stream field by field.

Miscellaneous / Other Resources

- Malware Organiser - A simple tool to organise large malicious/benign files into a organised Structure.

## 4. Awesome Bigdata

Distributed Programming

- Baidu Bigflow - an interface that allows for writing distributed computing programs providing lots of simple, flexible, powerful APIs to easily handle data of any scale.

## 5. Awesome Indie

Communities / Other

**r/IndieBiz**- A subreddit for small and independent businesses.

## 6. Awesome Vehicle Security

Miscellaneous / Episodes

- Arduino - Arduino boards have a number of shields you can attach to connect to CAN-enabled devices.
- CANdiy-Shield (⭐23)
- DFRobot CAN-BUS Shield For Arduino
- SparkFun CAN-BUS Shield
- arduino-canbus-monitor (⭐278) - No matter which shield is selected you will need your own sniffer. This is implementation of standard Lawicel/SLCAN protocol for Arduino + any MCP CAN Shield to use with many standard CAN bus analysis software packages or SocketCAN

## 7. Awesome Influxdb

Reference material

- InfluxDB in IoT world. Part 1: Introduction | Part 2: Hosting and scaling on AWS | Part 3: Plotting graphs using Grafana

## 8. Awesome Cpp

Graphics

- DirectXTK (⭐2.5k) - A collection of helper classes for writing DirectX 11.x code in C++. [MIT]

## 9. Awesome Algorithms

Websites

- The Sound of Sorting - The Sound of Sorting - "Audibilization" and Visualization of Sorting Algorithms

## 10. Awesome Vue

Resources / Books

- Front-end com Vue.js by Leonardo Vilarinho, Casa do Código. (November 2017)

## 11. Awesome Aws

Open Source Repos / Accompanying Repos

- aws-big-data-blog 🔥🔥🔥 (⭐894) - Samples from the AWS Big Data Blog.

## 12. Awesome Beacon

iBeacon for Developers

## 13. Awesome Ruby

CMS

- ComfortableMexicanSofa (⭐2.7k) - Powerful Rails 5.2+ CMS Engine.

- Prev: Nov 29, 2017
- Next: Nov 27, 2017