Cryptology ePrint Archive
Provides access to author-submitted research papers in cryptology. ... International Association for Cryptologic Research (IACR) [ Cryptology ePrint archive ] ...
http://eprint.iacr.org/
popularity:
cryptography
security
crypto
cryptology
research
papers
science
archive
reference
eprint
|
JavaScrypt: Browser-Based Cryptography Tools
No information avaiable
similarity:
popularity:
javascript
cryptography
security
encryption
crypto
web
tools
programming
code
aes
|
NIST.gov - Computer Security Division - Computer Security Resource Center
Designed to collect and disseminate computer security information and resources to help users better protect their data and systems.
similarity:
popularity:
security
nist
standards
reference
government
computer
infosec
internet
technology
cryptography
|
Shadowserver Foundation - Main - HomePage
Established in 2004, The Shadowserver Foundation gathers intelligence on the ... Our mission is to understand and help put a stop to high stakes cybercrime in ...
similarity:
popularity:
security
research
botnet
malware
hacking
statistics
reference
web
internet
virus
|
SecLists.Org Security Mailing List Archive
Security mailing list archive for the Nmap lists, Bugtraq, Full Disclosure, Security Basics, Pen-test, and dozens more. Search capabilities and RSS feeds with smart ...
similarity:
popularity:
security
hacking
reference
lists
network
sysadmin
networking
archive
internet
list
|
Alice and Bob - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
cryptography
security
reference
wikipedia
alice
encryption
networking
culture
bob
email
|
Steganography - Wikipedia, the free encyclopedia
The word steganography is of Greek origin and means "concealed writing" ... Retrieved from "http://en.wikipedia.org/wiki/Steganography" ...
similarity:
popularity:
steganography
security
cryptography
encryption
wikipedia
reference
article
cool
code
wiki
|
Academic software for research papers | Mendeley
Social software and web-based bibliography organiser for research paper management, sharing, and tagging. Automatic metadata and citation extraction.
similarity:
popularity:
research
software
tools
collaboration
reference
science
web2.0
papers
academic
bibliography
|
jsCrypto
No information avaiable
similarity:
popularity:
javascript
cryptography
encryption
security
crypto
library
programming
opensource
aes
js
|
SecurityFocus interview with Solar Designer on John the Ripper 1.7
No information avaiable
similarity:
popularity:
security
password
cryptography
programming
passwords
code
crypto
rainbowtable
generator
generators
|
Mobilefish.com - A tutorial about Bouncy Castle Crypto. Cryptography basics. Includes examples.
No information avaiable
similarity:
popularity:
java
cryptography
crypto
security
bouncycastle
tutorial
j2me
programming
opensource
jce
|