Source library · 320 curated entries

Where every claim in SecProve comes from.

A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.

320SOURCES
143ORGS
50DOMAINS
320ADDED · 90 DAYS
Pillar · multi-selectall 4 selected
Domainsselect pillar(s) above
Browsing the full corpus. Pick pillars above to narrow to specific domains.
5 sources · matching filters · sorted by citation density
Sort
ACybersecurity5 sources
01

Set of practical cryptography exercises. Learn by breaking real-world crypto systems — the best way to understand cryptographic vulnerabilities.

GuideIntermediateA15 · CryptographyNEW · 1mo ago
Test your knowledge · A15
02

The TLS 1.3 specification. Removes legacy cipher suites, adds 0-RTT, mandates forward secrecy. Required reading for any TLS/PKI question.

FrameworkIntermediateA15 · CryptographyNEW · 1d ago
Test your knowledge · A15
03

NIST's selected post-quantum cryptographic algorithms: ML-KEM, ML-DSA, and SLH-DSA. The future of cryptography in the quantum era.

FrameworkAdvancedA15 · CryptographyNEW · 1mo ago
Test your knowledge · A15
04

Practical guidance on selecting and implementing cryptographic algorithms. Covers symmetric, asymmetric, hashing, and key management.

FrameworkIntermediateA15 · CryptographyNEW · 22d ago
Test your knowledge · A15
05

Practitioner-oriented cryptography textbook. Covers modern symmetric/asymmetric algorithms, protocols, and implementation pitfalls. Good for applied crypto questions vs. pure theory.

ResearchIntermediateA15 · CryptographyNEW · 22d ago
Test your knowledge · A15

Ready to test what you've learned?

Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.