*If you know good sites, Please let me know.
Crypto links
Crypto gate
Korean cryptographers gateway:
http://www.cryptogate.com
Infosec security portal:
http://www.infosec.co.kr
Ritter
?ǖ
s crypto glossary:
http://www.ciphersbyritter.com/GLOSSARY.HTM
Crypto and Security:
http://www.strano.net/network/internet/crypto/crypto.htm
Cryptology pointers:
http://www.tcs.hut.fi/~helger/crypto/
Online papers
Crypto publications online:
http://www.cryptosoft.com/html/secpub.htm
Workshop on Selected Areas in Cryptography:
http://adonis.ee.queensu.ca:8000/sac/
Cryptology ePrint Archive:
http://eprint.iacr.org/
IEEE Xplore:
http://ieeexplore.ieee.org/lpdocs/epic03/
IEICE homepage:
http://search.ieice.or.jp/
ResearchIndex(NEC):
http://citeseer.nj.nec.com/
Conference calendar:
Conference Calendar from UCL Crypto Group:
http://www.dice.ucl.ac.be/crypto/call_for_papers.html
Calendar of security and privacy related events:
http://www.cs.utah.edu/flux/cipher/cipher-hypercalendar.html
IACR Calendar of Events in Cryptology:
http://www.iacr.org/events/index.html
Cryptographers:
Cryptographers' HomePages:
http://www.cs.berkeley.edu/~daw/people/crypto.html
Kevin McCurley's list:
http://www.swcp.com/~mccurley/cryptographers/cryptographers.html
Adam Back's list
http://www.cypherspace.org/~adam/
List from ETH Zurich:
http://www.inf.ethz.ch/personal/camenisc/cryptographers.html
Keith Matthews' list of number theorists:
http://www.math.uga.edu/~ntheory/list.html
Crypto groups
International
UCL Crypto Group:
http://www.dice.ucl.ac.be/crypto/
U Waterloo CACR (crypto lab):
http://www.cacr.math.uwaterloo.ca/
Queen's Cryptography and Data Security Lab:
http://adonis.ee.queensu.ca:8000
Cryptography and Information Security Group at WPI
http://ece.wpi.edu/Research/crypt/
Cryptography, computer and network security:
http://www.cccns.cs.uwm.edu/
UC Davis computer security Lab.:
http://seclab.cs.ucdavis.edu/
Purdue COAST project:
http://www.cs.purdue.edu/coast/
Center for computer security research:
http://www.cs.uow.edu.au/ccsr/
Computer security group:
http://www.cl.cam.ac.uk/Research/Security/
Computer security and industrial cryptography:
http://www.esat.kuleuven.ac.be/cosic/
Domestic
Cryptology and Information Security Lab.:
http://caislab.icu.ac.kr
Computer Theory and Cryptography Lab.:
http://theory.snu.ac.kr
Information Security & Telecommunications Lab.:
http://wooly.postech.ac.kr
Information & Communications Security Lab.:
http://dosan.skku.ac.kr
Information Security & Digital Communication Lab.:
http://elec.sch.ac.kr
CryptoLab:
http://bora.dacom.co.kr/~gausmath/cryptohome.html
Communication & Information Security Lab.:
http://tele3.kyungpook.ac.kr
Center for information security technology:
http://cist.korea.ac.kr
IETF WGs-security area
An Open Specification for Pretty Good Privacy (openpgp):
http://www.ietf.org/html.charters/openpgp-charter.html
Authenticated Firewall Traversal (aft):
http://www.ietf.org/html.charters/aft-charter.html
Domain Name System Security (dnssec):
http://www.ietf.org/ids.by.wg/dnssec.htm
l
IP Security Policy (ipsp):
http://www.ietf.org/html.charters/ipsp-charter.html
IP Security Protocol (ipsec):
http://www.ietf.org/html.charters/ipsec-charter.html
IP Security Remote Access (ipsra):
http://www.ietf.org/html.charters/ipsra-charter.html
Intrusion Detection Exchange Format (idwg):
http://www.ietf.org/html.charters/idwg-charter.html
Kerberized Internet Negotiation of Keys (kink):
http://www.ietf.org/html.charters/kink-charter.html
Kerberos WG (krb-wg):
http://www.ietf.org/html.charters/krb-wg-charter.html
Multicast Security (msec):
http://www.ietf.org/html.charters/msec-charter.html
One Time Password Authentication (otp):
http://www.ietf.org/html.charters/otp-charter.html
Public-Key Infrastructure (X.509) (pkix):
http://www.ietf.org/html.charters/pkix-charter.html
S/MIME Mail Security (smime):
http://www.ietf.org/html.charters/smime-charter.html
Secure Network Time Protocol (stime):
http://www.ietf.org/html.charters/stime-charter.html
Securely Available Credentials (sacred):
http://www.ietf.org/html.charters/sacred-charter.html
Security Issues in Network Event Logging (syslog):
http://www.ietf.org/html.charters/syslog-charter.html
Secure Shell (secsh):
http://www.ietf.org/html.charters/secsh-charter.html
Simple Public Key Infrastructure (spki):
http://www.ietf.org/html.charters/spki-charter.html
Transport Layer Security (tls):
http://www.ietf.org/html.charters/tls-charter.html
Web Transaction Security (wts):
http://www.ietf.org/html.charters/wts-charter.html
XML Digital Signatures (xmldsig):
http://www.ietf.org/html.charters/xmldsig-charter.html
Companies
RSA Security:
http://www.rsa.com
Certicom:
http://www.certicom.com
Frontier Technologies Corporation:
http://www.frontiertech.com/
RSA Euro:
http://www.RSAeuro.com
VeriSign:
http://www.verisign.com
Counterpane Company:
http://www.counterpane.com
Cryptography Research:
http://www.cryptography.com/index.html
Zero-knowledge Systems:
http://www.zeroknowledge.com/
Check point software technologies:
http://www.checkpoint.com
Cybersafe corporation:
http://www.cybersafe.com
Entercept security technologies:
http://www.entercept.com
NFR security:
http://www.nfr.com
Sanctum, Inc.:
http://www.sanctuminc.com
Secure computing:
http://www.securecomputing.com
Votehere:
http://www.votehere.com
Others
CERT:
http://www.cert.org
CERTCC-KR :
http://www.certcc.or.kr