|
The Entropy Key is a small, unobtrusive and easily installed USB stick that ... It has been developed by UK-based Simtec Electronics, a design consultancy and ...
http://www.entropykey.co.uk/
popularity:
security
hardware
entropy
usb
linux
cryptography
encryption
crypto
electronics
random
|
|
No information avaiable
similarity:
popularity:
security
cryptography
aes
encryption
tutorial
crypto
comic
algorithms
humor
programming
|
![]() |
The Beagle Board is a low-cost, fan-less single-board computer with all of the expandability of today's desktop machines, but without the bulk, expense, or noise. ...
similarity:
popularity:
hardware
linux
embedded
opensource
electronics
arm
diy
usb
computer
beagleboard
|
|
COPACOBANA - special-purpose hardware for code-breaking ... copacobana.org goes online. The website is intented to provide information on the COPACOBANA device - A cost ...
similarity:
popularity:
fpga
hardware
crypto
cryptography
encryption
security
des
distributed
parallel
cracking
|
|
The application Cryptool is a free e-learning application for Windows. You can use it to apply and analyze cryptographic algorithms. The current version of Cryptool ...
similarity:
popularity:
cryptography
security
tools
encryption
crypto
software
opensource
tutorials
tutorial
learning
|
|
An unpredictable (typically a large randomly chosen) number is used to begin ... Retrieved from "http://en.wikipedia.org/wiki/Public-key_cryptography" ...
similarity:
popularity:
cryptography
security
encryption
wikipedia
crypto
reference
pgp
pki
privacy
public-key
|
|
Yubico, The ... Agfa uses Yubico technology for secure, simple and affordable remote ... 1-408-774-4064 Tel. Sweden: +46 8 411 30 00 Email: info@yubico.com ...
similarity:
popularity:
security
usb
hardware
authentication
openid
encryption
password
identity
opensource
technology
|
|
Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...
similarity:
popularity:
security
password
passphrase
encryption
privacy
crypto
reference
tools
cryptography
passwords
|
|
No information avaiable
similarity:
popularity:
ubuntu
encryption
linux
security
filesystem
howto
crypto
cryptography
tutorial
sysadmin
|
|
Explanation and source code for the crypto system used in Cryptonomicon. ... Schneier.com is a personal website. Opinions expressed are not necessarily those of BT. ...
similarity:
popularity:
cryptography
security
encryption
algorithm
crypto
programming
cryptonomicon
solitaire
privacy
algorithms
|
|
Home of open source libraries of the Legion of the Bouncy Castle and their Java cryptography and C# cryptography resources
similarity:
popularity:
java
security
cryptography
encryption
crypto
programming
api
opensource
library
development
|