Cryptography

Algorithms

Blowfish - Twofish - Solitaire - Helix - Phelix - Yarrow - Fortuna - Threefish - Skein

Programs

Password Safe

Papers

Pseudorandom Number Generators:

Attacking PRNGs

Presentation Slides

Attack Trees (1999 SANS Network Security Conference)
Yarrow PRNG (Sixth Annual Workshop on Selected Areas in Cryptography)
A Hacker Looks at Cryptography (Black Hat '99)
Cryptography and Computer Security: Current Technology and Future Trends [audio] (HOPE, 1997)

Miscellaneous

Microsoft PPTP
CMEA Digital Cellular
S/MIME Cracking Screen Saver
Review of TriStrata Public Information

Photo of Bruce Schneier by Per Ervland.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of Co3 Systems, Inc..