Cryptology ePrint Archive
Provides access to author-submitted research papers in cryptology. ... International Association for Cryptologic Research (IACR) [ Cryptology ePrint archive ] ...
http://eprint.iacr.org/
popularity:
cryptography
security
crypto
cryptology
research
papers
science
archive
reference
eprint
|
An Overview of Cryptography
Defines cryptographic terms and concepts, offers crypto scheme comparison, ... key, for example, can be found at http://www.garykessler.net/kumquat_pubkey.html. ...
similarity:
popularity:
cryptography
security
reference
encryption
crypto
algorithms
tutorial
computing
computer
programming
|
An Illustrated Guide to Cryptographic Hashes
Steve Friedl's Unixwiz.net Tech Tips. An Illustrated Guide to Cryptographic Hashes ... With the recent news of weaknesses in some common security algorithms ...
similarity:
popularity:
security
cryptography
crypto
hash
encryption
reference
programming
tutorial
algorithms
md5
|
Topics in cryptography - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
cryptography
security
crypto
wikipedia
computer
wiki
networking
hacking
math
research
|
Cryptography and Network Security, Fourth Edition
No information avaiable
similarity:
popularity:
cryptography
security
resources
books
reference
education
crypto
book
programming
network
|
Schneier.com
Renowned security technologist and author.
similarity:
popularity:
security
cryptography
blog
technology
privacy
crypto
encryption
blogs
people
schneier
|
Public-key cryptography - Wikipedia, the free encyclopedia
An unpredictable (typically a large randomly chosen) number is used to begin ... Retrieved from "http://en.wikipedia.org/wiki/Public-key_cryptography" ...
similarity:
popularity:
cryptography
security
encryption
wikipedia
crypto
reference
pgp
pki
privacy
public-key
|
Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
similarity:
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
|
RSA Laboratories - Crypto FAQ
No information avaiable
similarity:
popularity:
cryptography
security
rsa
faq
crypto
reference
encryption
programming
theory
laboratories
|
LASEC
FÉDÉRALE DE LAUSANNE. http://lasecwww.epfl.ch/ gavoine/rfid ... Tag-to-Reader channel: up to a few meters. http://lasecwww.epfl.ch/ gavoine/rfid ...
similarity:
popularity:
security
cryptography
research
reference
password
technology
computer
laboratory
epfl
website
|
CrypTool - Homepage
The application Cryptool is a free e-learning application for Windows. You can use it to apply and analyze cryptographic algorithms. The current version of Cryptool ...
similarity:
popularity:
cryptography
security
tools
encryption
crypto
software
opensource
tutorials
tutorial
learning
|