Dennis Núñez

PhD (c) in AI and Neuroimaging. CEA / Inria / Université Paris-Saclay



- "A Graduate Course in Applied Cryptography". Dan Boneh, Victor Shoup. [Link].

- "An Introduction to Mathematical Cryptography". Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman. [Link].

- "CRYPTO101". Laurens Van Houtven. [Link].

- "Cryptography Engineering". Niels Ferguson, Bruce Schneier, Tadayoshi Kohno. [Link].

- "Applied Cryptography". Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone. [Link].

- "Introduction to Modern Cryptography", 2nd edition. Jonathan Katz, Yehuda Lindell. [Link].

- "Security Engineering". Ross Anderson. [Link].

- "The Cryptoparty Handbook". Adam Hyde, Marta Peirano, Asher Wolf, Julian Oliver, Danja Vasiliev, Malte Dik, Jan Gerber, Brian Newbold, Brendan Howell. [Link].

- "Understanding Cryptography ". Christof Paar, Jan Pelzl. [Link].

Online Courses

- Applied Cryptography | Udacity. [Link].

- Crypto Strikes Back | Root Labs. [Link].

- Cryptography | Coursera & University of Maryland. [Link].

- Cryptography | Stanford. [Link].

- Cryptography I | Coursera & Stanford. [Link].

- Cryptography | Cybrary. [Link].

- Journey into cryptography | Khan Academy. [Link].

- CSE P 590TU: Practical Aspects of Modern Cryptography | University of Washington. [Link].

- Theory and Practice of Cryptography | Google University. [Link].


- Cryptography Stackexchange. [Link].

- Cryptopals Crypto Challenges. [Link].

- Garykessler Crypto. [Link].

- The International Association for Cryptologic Research (IACR). [Link].

- Learn Cryptography. [Link].

- Subreddit of Cryptography. [Link].

- WebCryptoAPI. [Link].


- Schneier on Security. [Link].


- Awesome Cryptography (GitHub). [Link].

- How to Generate Secure Random Numbers in Various Programming Languages. [Link].

- Untangling the Forget-Me Knot: Secure Account Recovery Made Simple. [Link].

- Cryptolab - is a set of cryptography related tools. [Link].

- CrypTool - Great variety of ciphers, encryption methods and analysis tools are introduced, often together with illustrated examples. [Link].

- CyberChef - a web app for encryption, encoding, compression, and data analysis. [Link].

- - Keybase maps your identity to your public keys, and vice versa. [Link].