Home - Science - Cryptography |
Page 6 101-120 of 175 Back | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | Next 20 |
101. Learning About Cryptography A basic introduction to cryptography ciphers, keys, keyspace, strength, cryptanalysis,etc. A Ciphers By Ritter page. Learning About cryptography. http://www.ciphersbyritter.com/LEARNING.HTM |
102. Interhack A group of technology researchers specializing in large scale system development, cryptography, privacy, and security. http://www.interhack.net/ |
103. Crypto-Log Internet Guide To Cryptography CryptoLog, the Internet Guide to cryptography, is an annotated collection ofpointers to everything available on the net/web about cryptography (programs http://www.uni-mannheim.de/studorg/gahg/PGP/cryptolog1.html |
104. Cryptography Decrypted Mel and Baker. Divided into four parts, secret keys and secret key methods, public and private keys, how keys are distributed through digital certificates, and three realworld systems. http://cseng.aw.com/book/0,3828,0201616475,00.html |
105. Financial Cryptography 2001 Financial cryptography '01. General Chair, Stuart Haber. Sponsorship Chair, BarbaraFox. FC01 is organized by the International Financial cryptography Association. http://fc01.ai/ |
106. IEEE P1363 Standard Specifications For Public Key Cryptography Standard specifications for public-key cryptography.Category Science Math cryptography Algorithms Public Key......The IEEE P1363 Home Page. Standard Specifications For PublicKey cryptography. OtherKinds of Public-Key cryptography Potential future standardization projects. http://grouper.ieee.org/groups/1363/ |
107. Cryonics And Cryptography Cryonics, cryptography, and Maximum Likelihood Estimation. In cryptography,the person who wants to send a secret message transforms it. http://www.merkle.com/merkleDir/cryptoCryo.html |
108. Best Possible Privacy 10240 bit Militarygrade cryptography. http://www.ciphers.de/bpp/bpp15.html |
109. Electronic Commerce Policy Electronic Commerce Task Force Security and cryptography Security and cryptography. The benefits of cryptographyfor electronic commerce, privacy protection and crime prevention are clear. http://e-com.ic.gc.ca/english/crypto/ |
110. Bokler Software Commercial site for Bokler Software's cryptographic software components for Windows® developers. The site also contains information on the fundamentals of cryptography and inclusion in program code. http://www.bokler.com/resrcs_1.html |
111. Lanaki Lesson 1 CLASSICAL cryptography COURSE BY LANAKI September 27, 1995 LECTURE 1 SIMPLE SUBSTITUTION. (2) The determination of the general system of cryptography employed. http://www.fortunecity.com/skyscraper/coding/379/lesson1.htm |
112. Cryptography And Information Security / Cryptography And cryptography and Information Security Research Group. Top row (leftto right) Ueli Maurer, Martin Hirt Middle row (ltr) Renato http://www.crypto.ethz.ch/ |
113. StreamSec StrSecII A collection of optimized cryptography components and routines for Delphi 46. The integrated ASN.1 support allows building of X.509 certificates using native Delphi code. Also implements 3DES, Twofish, and Rijndael (AES) in ECB, CBC, OFB, CFB, CTR, PCFB and ABC modes. http://www.streamsec.com/prod_strsec2.asp |
114. Cryptography's Role In Securing The Information Society cryptography's. Role. In. Securing The. Information. Society. 1 GROWING VULNERABILITYIN THE INFORMATION AGE; 2 cryptography ROLES, MARKET, AND INFRASTRUCTURE; http://www.nap.edu/readingroom/books/crisis/ |
115. WCC 2001 - International Workshop On Coding And Cryptography Paris, 812 January 2001 http://www-rocq.inria.fr/codes/WCC2001/ |
116. Logi.crypto Formerly Cryptonite, a pure java package for strong cryptography. It supplies RSA (usable outside of North America), DES, TripleDES implementation as well as other utility classes. Open Source, GPL/Commercial http://logi.org/logi.crypto/ |
117. Cryptography Pointers Pseudorandom Functions Boolean functions. PublicKey cryptography, PKCBased on Some Special Mathematical Structures. Public-Key Encryption http://www.tcs.hut.fi/~helger/crypto/ |
118. Digital Signature Resource Center A collection of links to digital signature related laws, policy development, ecommerce, and cryptography resources. (Internet Law and Policy Forum) http://www.ilpf.org/groups/index.htm#authentication |
119. International Cryptography Freedom Links to crypto download and information from around the world.Category Computers Hacking cryptography......INTERNATIONAL cryptography FREEDOM. Last Updated 23 January 1999 Add Spain 2. relatedto cryptography, cryptanalysis, steganography, information hiding, etc. http://www.dis.org/Crypto/crypto-free.html |
120. Laboratory For Theoretical And Quantum Computing, Montreal Publications, laboratory staff members, and Java applets related to quantum cryptography, quantum information, quantum teleportation, computational complexity, algorithmics, and graph theory. http://www.iro.umontreal.ca/labs/theorique/index.html.en |
Page 6 101-120 of 175 Back | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | Next 20 |