An Illustrated Guide to Cryptographic Hashes
Steve Friedl's Unixwiz.net Tech Tips. An Illustrated Guide to Cryptographic Hashes ... With the recent news of weaknesses in some common security algorithms ...
http://www.unixwiz.net/techtips/iguide-crypto-hashes.html
popularity:
security
cryptography
crypto
hash
encryption
reference
programming
tutorial
algorithms
md5
|
Cryptology ePrint Archive
Provides access to author-submitted research papers in cryptology. ... International Association for Cryptologic Research (IACR) [ Cryptology ePrint archive ] ...
similarity:
popularity:
cryptography
security
crypto
cryptology
research
papers
science
archive
reference
eprint
|
Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
similarity:
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
|
Diceware Passphrase Home Page
Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...
similarity:
popularity:
security
password
passphrase
encryption
privacy
crypto
reference
tools
cryptography
passwords
|
How To Safely Store A Password | codahale.com
No information avaiable
similarity:
popularity:
security
password
encryption
bcrypt
programming
passwords
hash
development
md5
cryptography
|
NSA :: Overview
NSA@home is a fast FPGA-based SHA-1 and MD5 bruteforce cracker. ... Contact me: nsa unaligned org (figure out where to put the @ and .) irc.unaligned.org #nsa ...
similarity:
popularity:
security
hardware
fpga
crypto
cryptography
hash
hack
diy
md5
electronics
|
jsCrypto
No information avaiable
similarity:
popularity:
javascript
cryptography
encryption
security
crypto
library
programming
opensource
aes
js
|
JavaScrypt: Browser-Based Cryptography Tools
No information avaiable
similarity:
popularity:
javascript
cryptography
security
encryption
crypto
web
tools
programming
code
aes
|
A Lesson In Timing Attacks (or, Don't use MessageDigest.isEquals) | codahale.com
No information avaiable
similarity:
popularity:
security
cryptography
java
timing
programming
hacking
attack
crypto
statistics
python
|
Paj's Home
No information avaiable
similarity:
popularity:
security
programming
javascript
cryptography
sha1
md5
authentication
people
encryption
webmaster
|
Public key infrastructure - Wikipedia, the free encyclopedia
This article's external links may not follow Wikipedia's content policies or guidelines. ... Retrieved from "http://en.wikipedia.org/wiki/Public_key_infrastructure" ...
similarity:
popularity:
pki
security
cryptography
encryption
crypto
certificate
wikipedia
reference
wiki
ssl
|