Network Security at Stanford
Provides details of the security research carries out by this group. ... The Applied Crypto Group is a part of the Security Lab in the Computer Science ...
http://crypto.stanford.edu/
popularity:
security
crypto
cryptography
computerscience
stanford
education
|
Cryptome
Hosts essays, articles, and the text of legislation that covers cryptology, dual-use technologies, national security, and intelligence.
similarity:
popularity:
security
politics
government
news
privacy
intelligence
crypto
conspiracy
reference
cryptography
|
NSA :: Overview
NSA@home is a fast FPGA-based SHA-1 and MD5 bruteforce cracker. ... Contact me: nsa unaligned org (figure out where to put the @ and .) irc.unaligned.org #nsa ...
similarity:
popularity:
security
hardware
fpga
crypto
cryptography
hash
hack
diy
md5
electronics
|
cr.yp.to
Welcome to cr.yp.to. Some popular pages that you might be looking for: United Airlines sucks (part 40); D. J. Bernstein's home page; the qmail home page; ...
similarity:
popularity:
security
software
linux
djb
crypto
unix
programming
cryptography
dns
qmail
|
Advanced Encryption Standard - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
aes
cryptography
encryption
security
crypto
wikipedia
programming
reference
algorithm
computer
|
Welcome to elonka.com
Check http://elonka.com/newfoundland to see the site in progress. ... Since September 10, 2002, the elonka.com site has had this many visitors: ...
similarity:
popularity:
cryptography
kryptos
crypto
security
games
elonka
people
blog
encryption
science
|
How PGP works
No information avaiable
similarity:
popularity:
pgp
security
cryptography
encryption
reference
crypto
privacy
tools
tutorial
documentation
|
SecurityFocus interview with Solar Designer on John the Ripper 1.7
No information avaiable
similarity:
popularity:
security
password
cryptography
programming
passwords
code
crypto
rainbowtable
generator
generators
|
ScramDisk - Free Disk Encryption Software
No information avaiable
similarity:
popularity:
security
software
encryption
cryptography
crypto
disk
privacy
tools
networking
filesystem
|
HMAC - Wikipedia, the free encyclopedia
As with any MAC, it may be used to simultaneously verify both the ... Retrieved from "http://en.wikipedia.org/wiki/HMAC" Categories: Message authentication ...
similarity:
popularity:
security
hmac
hash
crypto
algorithms
authentication
encryption
cryptography
programming
wikipedia
|
JavaScrypt: Browser-Based Cryptography Tools
No information avaiable
similarity:
popularity:
javascript
cryptography
security
encryption
crypto
web
tools
programming
code
aes
|