Introduction
NaCl advances the state of the art by improving security, by improving usability, ... NaCl is part of the CACE (Computer Aided Cryptography Engineering) ...
http://nacl.cace-project.eu/
popularity:
security
cryptography
crypto
library
programming
encryption
software
network
free
opensource
|
CWE - 2010 CWE/SANS Top 25 Most Dangerous Programming Errors
http://cwe.mitre.org/top25. 2009 CWE/SANS Top 25 Most Dangerous Programming Errors ... (CWE) (http://cwe.mitre.org/). MITRE maintains the CWE web site, with the ...
similarity:
popularity:
security
programming
software
development
vulnerabilities
reference
errors
testing
web
vulnerability
|
RSA Algorithm
No information avaiable
similarity:
popularity:
rsa
cryptography
security
encryption
algorithm
crypto
math
algorithms
programming
tutorial
|
Schneier.com
Monthly e-mail newsletter written by Bruce Schneier. Back issues available on site. ... After nine years of publication and with 125,000 readers, Crypto-Gram is the most popular ...
similarity:
popularity:
security
cryptography
news
privacy
crypto
blog
technology
schneier
blogs
newsletter
|
TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP, Mac OS X and Linux - Documentation
No information avaiable
similarity:
popularity:
encryption
security
opensource
tools
software
truecrypt
filesystem
cryptography
freeware
privacy
|
How To: Hash Data with Salt (C#/VB.NET)
No information avaiable
similarity:
popularity:
c#
security
.net
hash
encryption
programming
cryptography
crypto
howto
dotnet
|
Top 100 Network Security Tools
Review of the top 100 network security tools (free or commercial), as voted on by 3,200 Nmap Security Scanner users ... I (Fyodor) asked users from the nmap ...
similarity:
popularity:
security
tools
network
software
hacking
linux
sysadmin
networking
windows
utilities
|
Network Security at Stanford
Provides details of the security research carries out by this group. ... The Applied Crypto Group is a part of the Security Lab in the Computer Science ...
similarity:
popularity:
security
crypto
cryptography
computerscience
stanford
education
|
Cryptology ePrint Archive
Provides access to author-submitted research papers in cryptology. ... International Association for Cryptologic Research (IACR) [ Cryptology ePrint archive ] ...
similarity:
popularity:
cryptography
security
crypto
cryptology
research
papers
science
archive
reference
eprint
|
How PGP works
No information avaiable
similarity:
popularity:
pgp
security
cryptography
encryption
reference
crypto
privacy
tools
tutorial
documentation
|
MD5 - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
md5
cryptography
security
wikipedia
hash
algorithms
encryption
programming
crypto
wiki
|