

|  | 
				Provides details of the security research carries out by this group. ... The Applied Crypto Group is a part of the Security Lab in the Computer Science ...			 
				
					http://crypto.stanford.edu/				
							 
						popularity:
						 
							security						 
							crypto						 
							cryptography						 
							computerscience						 
							stanford						 
							education						 | 
|  | 
					No information avaiable				 
							similarity:
							 
							popularity:
							 
								security							 
								cryptography							 
								password							 
								programming							 
								hashing							 
								crypto							 
								passwords							 
								web							 
								hash							 
								encryption							 | 
|  | 
					J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...				 
							similarity:
							 
							popularity:
							 
								security							 
								encryption							 
								cryptography							 
								hardware							 
								hack							 
								research							 
								crypto							 
								memory							 
								hacking							 
								privacy							 | 
|  | 
					An unpredictable (typically a large randomly chosen) number is used to begin ... Retrieved from "http://en.wikipedia.org/wiki/Public-key_cryptography" ...				 
							similarity:
							 
							popularity:
							 
								cryptography							 
								security							 
								encryption							 
								wikipedia							 
								crypto							 
								reference							 
								pgp							 
								pki							 
								privacy							 
								public-key							 | 
|  | 
					Explanation and source code for the crypto system used in Cryptonomicon. ... Schneier.com is a personal website. Opinions expressed are not necessarily those of BT. ...				 
							similarity:
							 
							popularity:
							 
								cryptography							 
								security							 
								encryption							 
								algorithm							 
								crypto							 
								programming							 
								cryptonomicon							 
								solitaire							 
								privacy							 
								algorithms							 | 
|  | 
					NaCl advances the state of the art by improving security, by improving usability, ... NaCl is part of the CACE (Computer Aided Cryptography Engineering) ...				 
							similarity:
							 
							popularity:
							 
								security							 
								cryptography							 
								crypto							 
								library							 
								programming							 
								encryption							 
								software							 
								network							 
								free							 
								opensource							 | 
|  | 
					No information avaiable				 
							similarity:
							 
							popularity:
							 
								security							 
								cryptography							 
								java							 
								timing							 
								programming							 
								hacking							 
								attack							 
								crypto							 
								statistics							 
								python							 | 
|  | 
					Home of open source libraries of the Legion of the Bouncy Castle and their Java cryptography and C# cryptography resources				 
							similarity:
							 
							popularity:
							 
								java							 
								security							 
								cryptography							 
								encryption							 
								crypto							 
								programming							 
								api							 
								opensource							 
								library							 
								development							 | 
|  | 
					No information avaiable				 
							similarity:
							 
							popularity:
							 
								security							 
								cryptography							 
								encryption							 
								nist							 
								crypto							 
								toolkit							 
								standards							 
								computer							 
								algorithms							 
								specification							 | 
|  | 
					No information avaiable				 
							similarity:
							 
							popularity:
							 
								cryptography							 
								security							 
								rsa							 
								faq							 
								crypto							 
								reference							 
								encryption							 
								programming							 
								theory							 
								laboratories							 | 
|  | 
					Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...				 
							similarity:
							 
							popularity:
							 
								security							 
								password							 
								passphrase							 
								encryption							 
								privacy							 
								crypto							 
								reference							 
								tools							 
								cryptography							 
								passwords							 | 
 an example search result
			an example search result