Home - Science - Cryptography |
Page 3 41-60 of 175 Back | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | Next 20 |
41. Chilkat Crypt -- Encryption Component With AES, RSA, Blowfish, Twofish, And Digi Supports up to 256bit AES, 2048-bit RSA public-key cryptography, and digital signature creation and validation. By Chilkat Software, Inc. Component, Commercial http://www.chilkatsoft.com/ChilkatCrypt.asp | |
|
42. Hawaii Vacations - Hawaii Vacation Packages - Hawaii Tourism information. You can check out some fun links that I have collected though that have nothing to do with cryptography! Category Travel. http://draco.centerline.com:8080/~fran/crypto/ | |
|
43. Welcome To CCC Workshop Huang Shan City, China; 2328 June 2003. http://www.ustc.edu.cn/conference/ccc | |
|
44. Cryptography cryptography. The expansion of do so. One of the techniques for ensuringprivacy of files and communications is cryptography. What http://axion.physics.ubc.ca/crypt.html | |
|
45. RSA Laboratories | Public Key Cryptography Standards (PKCS) PKCS Standards http://www.rsasecurity.com/rsalabs/pkcs/index.html | |
|
46. The Cryptography Project The cryptography Project. Note This page is no longer being maintained. Go to myhome page for current pages. Denning Articles on cryptography and Wiretapping. http://www.cosc.georgetown.edu/~denning/crypto/ | |
|
47. OpenSSL: The Open Source Toolkit For SSL/TLS A toolkit implementing SSL v2/v3 and TLS protocols with fullstrength cryptography world-wide. It is based on SSLeay, developed by Eric Young and Tim Hudson. Free / Open Source (The OpenSSL Project) http://www.openssl.org | |
|
48. The Future Of Cryptography The Future of cryptography. Dorothy E. Denning Georgetown University. A new paradigmof cryptography, key escrow, is emerging and gaining acceptance in industry. http://www.cosc.georgetown.edu/~denning/crypto/Future.html | |
|
49. Web Pages Of Interest To Cryptography Researchers Web pages of interest to cryptography researchers. Quantum cryptographyat Los Alamos; EISS (Karlsruhe, Germany); UCL Crypto Group; SCSI; http://www.swcp.com/~mccurley/cryptographers/cryptographers.html | |
|
50. GILC -- Cryptography And Liberty The 1999 update of this report is now available. cryptography AND LIBERTY 1998. LisaKamm created the HTML version of the Report. The Importance of cryptography. http://www.gilc.org/crypto/crypto-survey.html | |
|
51. Linux 2.4: Next Generation Kernel Security Selective privileges (capabilities), cryptography, random number devices. http://www.linuxsecurity.com/feature_stories/kernel-24-security.html | |
|
52. An Introduction To Cryptography Richard A. Mollin. Intended for a onesemester introductory undergraduate course in cryptography. Covers symmetric and public key systems with chapters on advanced topics. http://www.math.ucalgary.ca/~ramollin/cryptopref.html | |
|
53. North American Cryptography Archives Strong cryptographic software, libraries, and information about cryptography, data security, and privacy. http://cryptography.org | |
|
54. Java Cryptography Architecture Java TM cryptography Architecture. JDK 1.2 significantly extends theJava cryptography Architecture, as described in this document. http://java.sun.com/products/jdk/1.2/docs/guide/security/CryptoSpec.html | |
|
55. Conference On Coding Theory, Cryptology, And Number Theory USNA, Annapolis, MD, USA; 2526 October 1998. http://web.usna.navy.mil/~wdj/talk98_30.htm | |
|
56. Cryptography In OpenBSD cryptography. Index Why do we ship cryptography?. OpenSSH. Why do we ship cryptography?In three words because we can. The OpenBSD project is based in Canada. http://www.openbsd.org/crypto.html | |
|
57. How SSL Works The article explains how Secure Sockets Layer (SSL) employs public key cryptography techniques for Internet security. (Netscape) http://developer.netscape.com/tech/security/ssl/howitworks.html | |
|
58. Oreilly.com -- Online Catalog: Java Cryptography Teaches you how to write secure programs using Java's cryptographic tools.Category Business Publishing and Printing Technical Books Java......Java cryptography teaches you how to write secure programs using Java'scryptographic tools. It Email This Page. Java cryptography. By http://www.oreilly.com/catalog/javacrypt/ | |
|
59. Information On Cryptography There is much overlap between network security and cryptography; seealso my web page with information on computer security. Links http://http.cs.berkeley.edu/~daw/crypto.html | |
|
60. Quantum Cryptography In Norway Applicationoriented research at NTNU, Trondheim and Telenor, Oslo http://www.fysel.ntnu.no/Optics/qcr/ | |
|
Page 3 41-60 of 175 Back | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | Next 20 |