

|  | 
				Provides details of the security research carries out by this group. ... The Applied Crypto Group is a part of the Security Lab in the Computer Science ...			 
				
					http://crypto.stanford.edu/				
							 
						popularity:
						 
							security						 
							crypto						 
							cryptography						 
							computerscience						 
							stanford						 
							education						 | 
|  | 
					One image contains random pixels and the other image contains the secret ... It is impossible to retrieve the secret information from one of the images. ...				 
							similarity:
							 
							popularity:
							 
								cryptography							 
								image							 
								crypto							 
								visual							 
								english							 
								encrypt							 
								security							 
								important							 
								toread							 
								vision							 | 
|  | 
					Provides education on information security through conferences, classes, a newsletter, buyer's guide, customizable awareness newsletter, and industry reports.				 
							similarity:
							 
							popularity:
							 
								security							 
								internet							 
								infosec							 
								conferences							 
								organization							 
								hacking							 
								technology							 
								computer							 
								education							 
								csi							 | 
|  | 
					The Entropy Key is a small, unobtrusive and easily installed USB stick that ... It has been developed by UK-based Simtec Electronics, a design consultancy and ...				 
							similarity:
							 
							popularity:
							 
								security							 
								hardware							 
								entropy							 
								usb							 
								linux							 
								cryptography							 
								encryption							 
								crypto							 
								electronics							 
								random							 | 
|  | 
					No information avaiable				 
							similarity:
							 
							popularity:
							 
								fips							 
								security							 
								cryptography							 
								encryption							 
								standard							 
								wikipedia							 
								crypto							 
								hsm							 
								government							 
								research							 | 
|  | 
					No information avaiable				 
							similarity:
							 
							popularity:
							 
								md5							 
								cryptography							 
								security							 
								wikipedia							 
								hash							 
								algorithms							 
								encryption							 
								programming							 
								crypto							 
								wiki							 | 
|  | 
					Botan is a BSD-licensed crypto library written in C++ ... Botan 1.8.3: Skein-512, XTS mode, new Python build system ... Botan Now Included in Fedora ...				 
							similarity:
							 
							popularity:
							 
								c++							 
								library							 
								cryptography							 
								crypto							 
								security							 
								programming							 
								software							 
								encryption							 
								development							 
								opensource							 | 
|  | 
					2009 May 7th: OpenSC 0.11.8 with Security Update ... Welcome to opensc-project.org ... OpenSC Project cross compile build environment. ...				 
							similarity:
							 
							popularity:
							 
								smartcard							 
								security							 
								cryptography							 
								opensource							 
								authentication							 
								linux							 
								opensc							 
								software							 
								crypto							 
								smartcards							 | 
|  | 
					free C++ library for cryptography: includes ciphers, message authentication codes, one-way hash functions, public-key ... cryptopp-users@googlegroups.com ...				 
							similarity:
							 
							popularity:
							 
								c++							 
								cryptography							 
								library							 
								programming							 
								security							 
								development							 
								opensource							 
								free							 
								crypto							 
								encryption							 | 
|  | 
					No information avaiable				 
							similarity:
							 
							popularity:
							 
								rsa							 
								cryptography							 
								security							 
								encryption							 
								algorithm							 
								crypto							 
								math							 
								algorithms							 
								programming							 
								tutorial							 | 
|  | 
					Designed to collect and disseminate computer security information and resources to help users better protect their data and systems.				 
							similarity:
							 
							popularity:
							 
								security							 
								nist							 
								standards							 
								reference							 
								government							 
								computer							 
								infosec							 
								internet							 
								technology							 
								cryptography							 | 
 an example search result
			an example search result