Simtec Entropy Key
The Entropy Key is a small, unobtrusive and easily installed USB stick that ... It has been developed by UK-based Simtec Electronics, a design consultancy and ...
http://www.entropykey.co.uk/
popularity:
security
hardware
entropy
usb
linux
cryptography
encryption
crypto
electronics
random
|
Moserware: A Stick Figure Guide to the Advanced Encryption Standard (AES)
No information avaiable
similarity:
popularity:
security
cryptography
aes
encryption
tutorial
crypto
comic
algorithms
humor
programming
|
BeagleBoard.org - default
The Beagle Board is a low-cost, fan-less single-board computer with all of the expandability of today's desktop machines, but without the bulk, expense, or noise. ...
similarity:
popularity:
hardware
linux
embedded
opensource
electronics
arm
diy
usb
computer
beagleboard
|
COPACOBANA - Special-Purpose Hardware for Code-Breaking
COPACOBANA - special-purpose hardware for code-breaking ... copacobana.org goes online. The website is intented to provide information on the COPACOBANA device - A cost ...
similarity:
popularity:
fpga
hardware
crypto
cryptography
encryption
security
des
distributed
parallel
cracking
|
CrypTool - Homepage
The application Cryptool is a free e-learning application for Windows. You can use it to apply and analyze cryptographic algorithms. The current version of Cryptool ...
similarity:
popularity:
cryptography
security
tools
encryption
crypto
software
opensource
tutorials
tutorial
learning
|
Public-key cryptography - Wikipedia, the free encyclopedia
An unpredictable (typically a large randomly chosen) number is used to begin ... Retrieved from "http://en.wikipedia.org/wiki/Public-key_cryptography" ...
similarity:
popularity:
cryptography
security
encryption
wikipedia
crypto
reference
pgp
pki
privacy
public-key
|
Yubico
Yubico, The ... Agfa uses Yubico technology for secure, simple and affordable remote ... 1-408-774-4064 Tel. Sweden: +46 8 411 30 00 Email: info@yubico.com ...
similarity:
popularity:
security
usb
hardware
authentication
openid
encryption
password
identity
opensource
technology
|
Diceware Passphrase Home Page
Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...
similarity:
popularity:
security
password
passphrase
encryption
privacy
crypto
reference
tools
cryptography
passwords
|
EncryptedFilesystemHowto - Community Ubuntu Documentation
No information avaiable
similarity:
popularity:
ubuntu
encryption
linux
security
filesystem
howto
crypto
cryptography
tutorial
sysadmin
|
Solitaire
Explanation and source code for the crypto system used in Cryptonomicon. ... Schneier.com is a personal website. Opinions expressed are not necessarily those of BT. ...
similarity:
popularity:
cryptography
security
encryption
algorithm
crypto
programming
cryptonomicon
solitaire
privacy
algorithms
|
bouncycastle.org
Home of open source libraries of the Legion of the Bouncy Castle and their Java cryptography and C# cryptography resources
similarity:
popularity:
java
security
cryptography
encryption
crypto
programming
api
opensource
library
development
|