Legion Of The Bouncy Castle Provides open source implentations of the Java cryptography Extension 1.2.1, and a lightweight Java cryptography API for the J2ME, and the JDK. Open Source http://www.bouncycastle.org/
Financial Cryptography '00 The conference is organized by the International Financial cryptographyAssociation (IFCA). The Financial cryptography conferences http://www.ifca.ai/fc00/
VeriSign Providing publickey cryptography solutions. Issues Digital IDs to support privacy and authentication within a broad range of products and services. http://digitalid.verisign.com/
The Applied Cryptography Case The Applied cryptography Case Only Americans Can Type! In January14, 2000, new US crypto export regulations went into effect. http://people.qualcomm.com/karn/export/
Cryptography Scientific Freedom And Human Rights Issues Ian Goldberg Internet Security, Applications, Authentication and cryptographyProject UCLA, Berkeley. Called by The New York Times http://www.aaas.org/spp/cstc/briefing/crypto/
Kaladix A server Linux distribution that includes a collection of security hardening patches (mostly for the kernel), RSBAC, cryptography and general security software. Currently unavailable. http://www.kaladix.org
Cryptography DJ Bernstein Courses cryptography. This is an online introduction to cryptography. Secretkeycryptography. Unpredictable random functions Random recurrences http://cr.yp.to/crypto.html
Internet Privacy Coalition The IPC promotes privacy and security on the Internet through widespread public availability of strong encryption and the relaxation of export controls on cryptography. http://www.privacy.org/ipc/
Cryptography And Network Security, Second Edition Technical Resources and Course Web Site for cryptography and Network SecurityPrinciples and Practice, Second Edition. Computer Security and cryptography. http://williamstallings.com/Security2e.html
Lucas Sequences In Cryptography Focus on their use in primality testing, with pseudocode. Includes an explanation of the strong Lucas PRP test. http://www.eskimo.com/~weidai/lucas.html
Cryptography For Visual Basic Richard Bondi. Subtitled A Programmers Guide to the Microsoft CryptoAPI which describes what the book is about. http://www.cryptovb.com/books/bondi/bondi.html
Cryptography Software Code In Visual Basic A commercial site for Visual Basic developers interested in implementing cryptography by using CryptoSys. http://www.di-mgt.com.au/crypto.html
ITAR Civil Disobedience Protest against cryptography export restrictions in the USA. Become an illegal international arms trafficker with one click. List of known arms traffickers. http://online.offshore.com.ai/arms-trafficker/
Quantum Cryptography Quantum cryptography After a decade of lab experiments, quantum cryptographyis approaching feasibility. We can now think about http://www.newsfactor.com/perl/story/20732.html
8th IMA Conference On Cryptography And Coding All aspects of the theory and applications of cryptography and coding. Royal Agricultural College, Cirencester; 1719 December 2001. http://www.ima.org.uk/mathematics/confcryptography.htm
UvT Verouderd Adres/outdated Address BertJaap Koops homepage on several countries' cryptography export laws.Category Society Issues Privacy cryptographyUniversiteit van Tilburg, http://www.kub.nl/~frw/people/koops/lawsurvy.htm
Phaos Technology Solutions SSL, TLS, S/MIME, digital certificate, PKI, and cryptography libraries. commercial http://www.phaos.com/index.html
Honors Seminar In Cryptography Honors Seminar in cryptography. Spring Semester, 2002. University of Illinoisat Chicago. Seminar Outline. Part I. cryptography before 1960. http://raphael.math.uic.edu/~jeremy/crypt/crypt.html
Centre For Quantum Computation, Cambridge Provides an overview of quantum computation and cryptography work at Cambridge University. There are also tutorials and announcements of upcoming conferences and workshops. http://cam.qubit.org