|
Provides access to author-submitted research papers in cryptology. ... International Association for Cryptologic Research (IACR) [ Cryptology ePrint archive ] ...
http://eprint.iacr.org/
popularity:
cryptography
security
crypto
cryptology
research
papers
science
archive
reference
eprint
|
|
Check http://elonka.com/newfoundland to see the site in progress. ... Since September 10, 2002, the elonka.com site has had this many visitors: ...
similarity:
popularity:
cryptography
kryptos
crypto
security
games
elonka
people
blog
encryption
science
|
![]() |
Monthly e-mail newsletter written by Bruce Schneier. Back issues available on site. ... After nine years of publication and with 125,000 readers, Crypto-Gram is the most popular ...
similarity:
popularity:
security
cryptography
news
privacy
crypto
blog
technology
schneier
blogs
newsletter
|
|
Provides details of the security research carries out by this group. ... The Applied Crypto Group is a part of the Security Lab in the Computer Science ...
similarity:
popularity:
security
crypto
cryptography
computerscience
stanford
education
|
|
Explanation and source code for the crypto system used in Cryptonomicon. ... Schneier.com is a personal website. Opinions expressed are not necessarily those of BT. ...
similarity:
popularity:
cryptography
security
encryption
algorithm
crypto
programming
cryptonomicon
solitaire
privacy
algorithms
|
|
No information avaiable
similarity:
popularity:
security
cryptography
aes
encryption
tutorial
crypto
comic
algorithms
humor
programming
|
|
No information avaiable
similarity:
popularity:
aes
cryptography
encryption
security
crypto
wikipedia
programming
reference
algorithm
computer
|
|
This article may require cleanup to meet Wikipedia's quality standards. Please improve ... Please help improve this article by adding reliable references. ...
similarity:
popularity:
cryptography
encryption
wikipedia
security
programming
crypto
algorithm
pad
wiki
reference
|
![]() |
Automated collection of research articles on physics, mathematics, nonlinear sciences, computer science, and quantitative biology. Hosted by Cornell University, Ithaca.
similarity:
popularity:
science
research
papers
physics
reference
library
mathematics
math
archive
education
|
|
No information avaiable
similarity:
popularity:
pgp
security
cryptography
encryption
reference
crypto
privacy
tools
tutorial
documentation
|
|
Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...
similarity:
popularity:
security
password
passphrase
encryption
privacy
crypto
reference
tools
cryptography
passwords
|