An Illustrated Guide to Cryptographic Hashes
Steve Friedl's Unixwiz.net Tech Tips. An Illustrated Guide to Cryptographic Hashes ... With the recent news of weaknesses in some common security algorithms ...
http://www.unixwiz.net/techtips/iguide-crypto-hashes.html
popularity:
security
cryptography
crypto
hash
encryption
reference
programming
tutorial
algorithms
md5
|
Hash'em all! Free online text and file hashing
Free online text and file hashing. Supports 35 algorithms, unicode, null ... For informations or comments please contact info@hashemall.com. Seen on ULB ...
similarity:
popularity:
hash
cryptography
sha
md5
security
encryption
online
generator
tools
web
|
TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP, Mac OS X and Linux
Open source on-the-fly disk encryption software for Windows XP/2000 and Linux.
similarity:
popularity:
security
encryption
software
opensource
tools
cryptography
windows
linux
freeware
privacy
|
Crypto++ Library 5.5.2 - a Free C++ Class Library of Cryptographic Schemes
free C++ library for cryptography: includes ciphers, message authentication codes, one-way hash functions, public-key ... cryptopp-users@googlegroups.com ...
similarity:
popularity:
c++
cryptography
library
programming
security
development
opensource
free
crypto
encryption
|
Schneier.com
Monthly e-mail newsletter written by Bruce Schneier. Back issues available on site. ... After nine years of publication and with 125,000 readers, Crypto-Gram is the most popular ...
similarity:
popularity:
security
cryptography
news
privacy
crypto
blog
technology
schneier
blogs
newsletter
|
GData: An Online MD5 Hash Database
GDataOnline.com is the world's largest, fastest, online based MD5 reverse lookup project currently sporting 1133 million unique entries!
similarity:
popularity:
md5
security
hash
hacking
cryptography
database
tools
password
hack
crack
|
FreeOTFE
FreeOTFE: A free 'on-the-fly' transparent disk encryption program for PCs and PDAs. ... portable - Not only does FreeOTFE offer "portable mode", eliminating ...
similarity:
popularity:
encryption
security
windows
software
opensource
crypto
cryptography
linux
tools
free
|
Mobilefish.com - A tutorial about Bouncy Castle Crypto. Cryptography basics. Includes examples.
No information avaiable
similarity:
popularity:
java
cryptography
crypto
security
bouncycastle
tutorial
j2me
programming
opensource
jce
|
Network Security at Stanford
Provides details of the security research carries out by this group. ... The Applied Crypto Group is a part of the Security Lab in the Computer Science ...
similarity:
popularity:
security
crypto
cryptography
computerscience
stanford
education
|
Welcome to elonka.com
Check http://elonka.com/newfoundland to see the site in progress. ... Since September 10, 2002, the elonka.com site has had this many visitors: ...
similarity:
popularity:
cryptography
kryptos
crypto
security
games
elonka
people
blog
encryption
science
|
Topics in cryptography - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
cryptography
security
crypto
wikipedia
computer
wiki
networking
hacking
math
research
|