Home - Science - Cryptography |
Page 7 121-140 of 175 Back | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | Next 20 |
121. The Metaphor Is The Key Cryptography, The Clipper Chip, And The Page 709. THE METAPHOR IS THE KEY cryptography, THE CLIPPER CHIP,AND THE CONSTITUTION. A. Michael Froomkin*. A. Who Needs cryptography? http://www.swiss.ai.mit.edu/6095/articles/froomkin-metaphor/text.html |
122. Thirteenth Midwestern Conference On Combinatorics, Cryptography And Computing, Illinois State University, Normal, Illinois, USA; 1416 October 1999. Abstracts (DVI,PS). http://www.math.ilstu.edu/~saad/MCCCC.html |
123. COmputer Security And Industrial Cryptography COSIC COmputer Security and Industrial cryptography COSIC coorganizes aseries of seminars on Computational Number Theory and cryptography. http://www.esat.kuleuven.ac.be/cosic/ |
124. Ritter's Crypto Glossary And Dictionary Of Technical Cryptography Hyperlinked definitions and discussions of many cryptographic, mathematics, logic, statistics, and electronics terms used in cipher construction and analysis. http://www.ciphersbyritter.com/GLOSSARY.HTM |
125. Cryptography URL others. Return. Russian Government Standards. Return. European Standard(IDEA). Return. FAQ's about cryptography. cryptography FAQ; RSA's http://www.iae.nsk.su/pages/CRYPTO/welcome.html |
126. GNU Privacy Guard OpenPGP (RFC2440) implementation from the GNU project. Encrypts/decrypts/signs/digests files using strong cryptography. FAQ, downloads, documentation. http://www.gnupg.org/ |
127. Survey Corporate Uses Of Cryptography I haven't heard any answer. 14 Sept 2002 Perth, Australia. cryptography in business? Symmetrickey cryptography. Much is said about 'keys' in cryptography. http://www.viacorp.com/crypto.html |
128. CygnaCom Solutions, Inc. Providing consulting services in public key infrastructure (PKI), cryptography, evaluation of security products and computer security. http://www.cygnacom.com/ |
129. Security Related Links You are interested in Security and cryptography. cryptography. Intro SpecificTopics Politics Software Hardware Introductions to cryptography. http://www.semper.org/sirene/outsideworld/security.html |
130. Foundations Of Cryptography Oded Goldreich. Focuses on the basic mathematical tools needed for cryptographic design computational difficulty (oneway functions), pseudorandomness and zero-knowledge proofs. http://uk.cambridge.org/mathematics/catalogue/0521791723/ |
131. Beginners' Guide To Cryptography This website takes an academic interest in cryptography, with an emphasison the beginner. Beginners' Guide to cryptography. Welcome. http://www.murky.org/cryptography/index.shtml |
132. Financial Cryptography 2002 Sixth International Financial cryptography Conference. FC'02 is organizedby the International Financial cryptography Association. http://fc02.ai/ |
133. Privador Secure Sockets Agent adds strong encryption and certificatebased authentication to any client/server applications. It is a perfect tool for allowing your employees secure remote access to corporate servers, or for developing business-to-business extranet solutions. The SSA features 128-bit cryptography, is available on multiple operating system platforms, contains a Certificate Authority and supports a wide variety of application protocols. http://www.privador.com/ |
134. Oxford Quantum Computation Group We have moved! The Oxford Quantum Computation and cryptography Group isnow part of the Centre for Quantum Computation. Our new address is http://eve.physics.ox.ac.uk/QChome.html |
135. Crytographic Tools For Visual Basic A useful cryptography library for Visual Basic developers interested in implementing various algorithms. http://www.echeque.com/Kong/tools.htm |
136. CyberLaw (tm) CRYPTOGRAPHY SPEECH cryptography SPEECH. Dr. Daniel Bernstein has some ideas about cryptography,the art and science of keeping messages secure, that he wants to share. http://www.cyberlaw.com/cylw1095.html |
137. Crypto Law Survey BertJaap Koops homepage on several countries' cryptography export laws. http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm |
138. The Metaphor Is The Key Cryptography, The Clipper Chip, And The http://www.law.miami.edu/~froomkin/articles/clipper.htm |
139. Designs, Codes And Cryptography Bibliography Hypertext bibliography containing all papers published in Designs, Codes and cryptography, maintained by David M Jones. http://liinwww.ira.uka.de/bibliography/Misc/HBP/DCC.html |
140. IFCA International Financial cryptography Association. The InternationalFinancial exchange of ideas. Financial cryptography '03 info. http://www.ifca.ai/ |
Page 7 121-140 of 175 Back | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | Next 20 |