Home - Science - Cryptography |
Page 2 21-40 of 175 Back | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | Next 20 |
21. Cryptography: Scientific Freedom And Human Rights Issues U.S. Congressional briefing Was held to bring two more issues into the policy discussion scientific freedom to conduct and express cryptographic research, and human rights applications of cryptographic technologies. http://www.aaas.org/spp/dspp/cstc/briefing/crypto/ | |
|
22. Matt Blaze's Cryptography Resource On The Web - Crypto.com Information and news about cryptography related legislation in the United States. Very procrypto.Category Society Issues Privacy cryptography......Welcome to crypto.com, Matt Blaze's cryptography resource on the Web. August 21,2001 The Call for Papers for Financial cryptography '02 is available here. http://www.crypto.com/ | |
|
23. SSH : Support : Cryptography A-Z cryptography has become one of the main tools for privacy, trust, access control,electronic payments, corporate security, and countless other fields. http://www.ssh.com/support/cryptography/ | |
|
24. Cryptography FAQ Index faqs.org, Search FAQs Show References. cryptography FAQ cryptography-faq/part01 http://www.faqs.org/faqs/cryptography-faq/ | |
|
25. Products And Technologies Server Gated cryptography (SGC) overview, FAQ, technical information and related links. (Microsoft) http://www.microsoft.com/security/tech/sgc/ | |
|
26. Cryptography FAQ (01/10: Overview) Part01 Part02 - Part03 - Part04 - Part05 - Part06 - Part07 - Part08 - Part09 -Part10. cryptography FAQ (01/10 Overview). What is cryptology? cryptography? http://www.faqs.org/faqs/cryptography-faq/part01/ | |
|
27. Counterpane Labs: Why Cryptography Is Harder Than It Looks Crypto should be pretty simple, right? Wrong. http://www.counterpane.com/whycrypto.html | |
|
28. Foundations Of Cryptography By Oded Goldreich Oded Goldreich. A public domain book available online. Only partially completed.Category Science Math Communication Theory cryptography Theory......Foundations of cryptography (Fragments of a Book). Oded Goldreich. This 1998).See also The Foundations of cryptography An Essay (1997). http://theory.lcs.mit.edu/~oded/frag.html | |
|
29. Glossary For Internet Cryptography Glossary of cryptographic and computer terminology from the book Internet cryptography . http://www.visi.com/crypto/inet-crypto/glossary.html | |
|
30. The Polymorphic Cipher - An Article By C. B. Roellgen About Large Keyspace Crypt Ultrasecure 10240 bit cryptography for e-mails, text and file archives http://www.ciphers.de/bpp/ | |
|
31. North American Cryptography Archives A comprehensive archive for cryptography source code, software, liturature and links.Category Science Math cryptography Algorithms......Strong cryptographic software, libraries, and information about cryptography,data security, and privacy. North American cryptography Archives. http://www.cryptography.org/ | |
|
32. Cryptography For Visual Basic: Using Encryption And The CryptoAPI With Visual Ba A resource site for Visual Basic developers interested in implementing cryptography or the CryptoAPI. http://www.cryptovb.com/ | |
|
33. Cryptography Links Outside Of North America cryptography Links Outside of North America. Focused Topics cryptographyand Privacy; http//www.funet.fi/pub/crypt/cryptography/; http://www.cryptography.org/freecryp.htm | |
|
34. Cryptography And Security Explanation of encryption, ECHELON, multiple file encryption software, and why you need encryption. http://hermetic.nofadz.com/crypto.htm | |
|
35. Delphi Stuff Implementations by Dave Shapiro of two symmetric encryption algorithms (Blowfish and DES) and several message digests (MD2, MD4, MD5, SHA1, and RipeMD-160). Freeware with Delphi source code. http://www.csd.net/~daves/delphi/ | |
|
36. Products And Technologies Describes the difference between the SGC protocol and SSL/TLS. Also covers the implementation of SGC in Netscape products. (Microsoft) http://www.microsoft.com/security/tech/sgc/TechnicalDetails.asp | |
|
37. Thomas William Korner, Korner's Korner, Pleasures Of Counting, T.W.Korner, Mathe Lecture notes at Tom Koerner's home page. http://www.dpmms.cam.ac.uk/~twk/ | |
|
38. Deadlines Maintained by Anne Canteaut, INRIA. http://www-rocq.inria.fr/codes/Anne.Canteaut/annonces.html | |
|
39. Python Cryptography Toolkit A collection of cryptographic algorithms and protocols, implemented for use from Python. Open Source, Python license http://www.amk.ca/python/code/crypto.html | |
|
40. Cryptography Archive Crypto Glossary Page, cryptography, PGP, and Your Privacy A Short Primer. HonorsSeminar in cryptography, University of Illinois in Chicago. http://www.austinlinks.com/Crypto/ | |
|
Page 2 21-40 of 175 Back | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | Next 20 |