Home - Science - Cryptography |
Page 1 1-20 of 175 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | Next 20 |
1. Handbook Of Applied Cryptography This complete and authoritative reference work is available for download from the web.Category Computers Hacking cryptography...... updates, errata, supplementary information, chapter bibliographies, and other informationfor the 1996 CRC Handbook of Applied cryptography by Menezes, van http://www.cacr.math.uwaterloo.ca/hac/ | |
|
2. Counterpane Labs: Applied Cryptography Bruce Schneier. A comprehensive tutorial and reference but a little light on mathematical theory. http://www.counterpane.com/applied.html | |
|
3. Cryptography Directory of organizations, publications and newsgroups on the topic of cryptography, encryption and privacy. Bruce Schneier's Applied cryptography (2nd Ed.) is the crypto Bible for the professional engineer and interested layman. http://world.std.com/~franl/crypto.html | |
|
4. CDT Encryption Issues Page Note U.S. encryption export laws, and read court cases setting precedents for intellectual privacy and cryptography. Follow a timeline of national policy changes. A Glossary of Cryptographic Terms. Milestones of cryptography (1997 to present) http://www.cdt.org/crypto | |
|
5. Ronald L. Rivest : Cryptography And Security Offers cryptographic research and system design. Learn about various products and conferences. http://theory.lcs.mit.edu/~rivest/crypto-security.html | |
|
6. RSA Laboratories | Cryptography FAQ RSA Security present this detailed, searchable FAQ on all aspects of cryptography. Read it online or download the whole thing in Acrobat format. http://www.rsasecurity.com/rsalabs/faq | |
|
7. RSA Laboratories | Public Key Cryptography Standards (PKCS) The official site for PKCS. The standards are available in ASCII, Word, and PostScript formats. (RSA Laboratories) http://www.rsasecurity.com/rsalabs/pkcs/ | |
|
8. EPIC Archive - Cryptography Policy Electronic Privacy Information Center furnishes links to recent cryptography legislation, news and regulations. http://www.epic.org/crypto | |
|
9. Cryptography - An Overview cryptography algorithms and implementations. http://www.hack.gr/users/dij/crypto/ | |
|
10. Java(TM) Cryptography Extension (JCE) Provides framework and implementations for encryption, key generation and key agreement, and Message Authentication Code (MAC) algorithms. http://java.sun.com/products/jce/ | |
|
11. Cryptography Research, Inc. (logo), cryptography Research, Inc. Leader in Advanced Cryptosystems, Searchour site Home. “cryptography Research gets my highest recommendation.”. http://www.cryptography.com/ | |
|
12. Quantum Computation, Cryptography At Los Alamos National Laboratory descibes the work at Los Alamos National Laboratory, operated by the University of California for the US Department of Energy http://qso.lanl.gov/qc/ |
13. Differential Power Analysis (DPA) | Cryptography Research, Inc. (logo), cryptography Research, Inc. Leader in Advanced Cryptosystems,Search our site Acrobat PDF version here). cryptography Research, Inc. http://www.cryptography.com/resources/whitepapers/DPA.html | |
|
14. City In The Sky - The Delphi Cryptography Page Implementations by Dave Barton of many of the most useful symmetric encryption algorithms (Blowfish, Twofish, IDEA, Rijndael, Serpent, etc.) and message digests (RipeMD160, SHA-1, Tiger, etc). Freeware with Delphi source code. http://www.cityinthesky.co.uk/cryptography.html | |
|
15. Elliptic Curve Cryptography Elliptic Curve cryptography. On this page What is an Elliptic Curve? Whydo we care? So what's a group? Is Elliptic Curve cryptography Safe? http://world.std.com/~dpj/elliptic.html | |
|
16. The Polymorphic Cipher - An Article By C. B. Roellgen About Large Keyspace Crypt Huge keysize cryptography. http://www.identification.de/crypto/index.html | |
|
17. Hawaii Vacations - Hawaii Vacation Packages - Hawaii Tourism that have nothing to do with cryptography! Category Travel http://draco.centerline.com:8080/~franl/crypto.html | |
|
18. Visual Basic Instinct : Cryptography Explains cryptography from the Visual Basic point of view. Includes custom controls and DLLs for download. http://www.vbi.org/Folders/index.asp?id=572 |
19. SSH : Support : Cryptography A-Z Provides resources dealing with encryption, decryption, cryptanalysis and steganography. Find software and related tools. people are becoming available to major governments. cryptography has become one of the main tools for privacy, trust, http://www.ssh.fi/tech/crypto | |
|
20. Cryptography Theory And Practice Douglas Stinson. Subtitled "Discrete Mathematics and Its Applications". Written with more Category Science Math Communication Theory cryptography Books......cryptography Theory and Practice. the book's cover. Translations. cryptographyTheory and Practice has been translated into French by Serge Vaudenay. http://www.cacr.math.uwaterloo.ca/~dstinson/CTAP.html | |
|
Page 1 1-20 of 175 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | Next 20 |