Network Security at Stanford
Provides details of the security research carries out by this group. ... The Applied Crypto Group is a part of the Security Lab in the Computer Science ...
http://crypto.stanford.edu/
popularity:
security
crypto
cryptography
computerscience
stanford
education
|
Clipperz online password manager - Anatomy of a zero-knowledge web application
A zero-knowlege web application knows nothing of its users and their data. ... When we launched our online password manager, we dubbed it the first example of ...
similarity:
popularity:
security
privacy
cryptography
javascript
web
ajax
password
programming
webdev
development
|
How To: Hash Data with Salt (C#/VB.NET)
No information avaiable
similarity:
popularity:
c#
security
.net
hash
encryption
programming
cryptography
crypto
howto
dotnet
|
as3crypto - Google Code
<a class="ot-issue-link" href="http://code.google.com/p/as3crypto/issues/detail?id=12#c0">issue 12</a> (Does it support reading keys from a keystore? ...
similarity:
popularity:
as3
actionscript
encryption
security
flash
flex
library
cryptography
crypto
opensource
|
Hashcash.org
hashcash.org. hits since nov 03. Hashcash. Hashcash is a denial-of ... Its main current use is to help hashcash users avoid losing email due to content ...
similarity:
popularity:
spam
security
email
antispam
mail
crypto
cryptography
tools
programming
software
|
OutGuess - universal Steganography
No information avaiable
similarity:
popularity:
steganography
security
encryption
software
tools
cryptography
crypto
opensource
linux
research
|
Enigma
The official website of Frank Spiess.
similarity:
popularity:
cryptography
enigma
history
flash
cool
security
encryption
crypto
tools
reference
|
RSA
No information avaiable
similarity:
popularity:
security
software
rsa
technology
computer
cryptography
encryption
computersoftware
authentication
securid
|
md5.rednoize.com - reverse engineer md5 hashes - powered by rednoize.com
md5.rednoize.com. Search for md5 hashes. Type search term. Search. MD5. SHA1. Search in 56,091,995 md5/sha1 hashes. 17,738,931 searches answered since feb 2005. ...
similarity:
popularity:
md5
security
tools
password
hacking
crypto
search
crack
hash
sha1
|
LASEC
FÉDÉRALE DE LAUSANNE. http://lasecwww.epfl.ch/ gavoine/rfid ... Tag-to-Reader channel: up to a few meters. http://lasecwww.epfl.ch/ gavoine/rfid ...
similarity:
popularity:
security
cryptography
research
reference
password
technology
computer
laboratory
epfl
website
|
Vigenere Cipher Applet
No information avaiable
similarity:
popularity:
cryptography
vigenere
applet
crypto
cryptology
cipher
puzzles
java
security
technology
|