An Illustrated Guide to Cryptographic Hashes
Steve Friedl's Unixwiz.net Tech Tips. An Illustrated Guide to Cryptographic Hashes ... With the recent news of weaknesses in some common security algorithms ...
http://www.unixwiz.net/techtips/iguide-crypto-hashes.html
popularity:
security
cryptography
crypto
hash
encryption
reference
programming
tutorial
algorithms
md5
|
Python Cryptography Toolkit
No information avaiable
similarity:
popularity:
python
cryptography
security
crypto
programming
library
encryption
development
code
pycrypto
|
Cryptome
Hosts essays, articles, and the text of legislation that covers cryptology, dual-use technologies, national security, and intelligence.
similarity:
popularity:
security
politics
government
news
privacy
intelligence
crypto
conspiracy
reference
cryptography
|
Enigma
The official website of Frank Spiess.
similarity:
popularity:
cryptography
enigma
history
flash
cool
security
encryption
crypto
tools
reference
|
The International PGP Home Page
Contains updated information, FAQs and relevant links regarding the latest PGP versions.
similarity:
popularity:
security
pgp
encryption
software
privacy
crypto
tools
cryptography
opensource
freeware
|
Security Engineering - A Guide to Building Dependable Distributed Systems
Anderson, Ross. Author describes book in his own words. He explains how "pure" cryptography is not quite so pure when expressed in the context of real world ...
similarity:
popularity:
security
book
books
reference
engineering
network
computer
free
programming
ebook
|
FIPS 140-2 - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
fips
security
cryptography
encryption
standard
wikipedia
crypto
hsm
government
research
|
clipperz - Google Code
Software solutions are certainly an option, but I think you could also consider ... here<BR/><A HREF="http://code.google.com/p/clipperz" REL="nofollow">http://code.google.com/p ...
similarity:
popularity:
javascript
library
encryption
cryptography
security
crypto
opensource
ajax
programming
development
|
Keyczar
Keyczar: An open source cryptographic toolkit ... Introducing Keyczar ... Keyczar was originally developed by members of the Google Security Team and is ...
similarity:
popularity:
security
python
cryptography
java
programming
opensource
google
software
library
tools
|
md5.rednoize.com - reverse engineer md5 hashes - powered by rednoize.com
md5.rednoize.com. Search for md5 hashes. Type search term. Search. MD5. SHA1. Search in 56,091,995 md5/sha1 hashes. 17,738,931 searches answered since feb 2005. ...
similarity:
popularity:
md5
security
tools
password
hacking
crypto
search
crack
hash
sha1
|
CWE - 2010 CWE/SANS Top 25 Most Dangerous Programming Errors
http://cwe.mitre.org/top25. 2009 CWE/SANS Top 25 Most Dangerous Programming Errors ... (CWE) (http://cwe.mitre.org/). MITRE maintains the CWE web site, with the ...
similarity:
popularity:
security
programming
software
development
vulnerabilities
reference
errors
testing
web
vulnerability
|