Center for Information Technology Policy » L...
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
http://citp.princeton.edu/memory/
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
|
Schneier.com
Renowned security technologist and author.
similarity:
popularity:
security
cryptography
blog
technology
privacy
crypto
encryption
blogs
people
schneier
|
TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP, Mac OS X and Linux
Open source on-the-fly disk encryption software for Windows XP/2000 and Linux.
similarity:
popularity:
security
encryption
software
opensource
tools
cryptography
windows
linux
freeware
privacy
|
Public-key cryptography - Wikipedia, the free encyclopedia
An unpredictable (typically a large randomly chosen) number is used to begin ... Retrieved from "http://en.wikipedia.org/wiki/Public-key_cryptography" ...
similarity:
popularity:
cryptography
security
encryption
wikipedia
crypto
reference
pgp
pki
privacy
public-key
|
An Overview of Cryptography
Defines cryptographic terms and concepts, offers crypto scheme comparison, ... key, for example, can be found at http://www.garykessler.net/kumquat_pubkey.html. ...
similarity:
popularity:
cryptography
security
reference
encryption
crypto
algorithms
tutorial
computing
computer
programming
|
Diceware Passphrase Home Page
Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...
similarity:
popularity:
security
password
passphrase
encryption
privacy
crypto
reference
tools
cryptography
passwords
|
An Illustrated Guide to Cryptographic Hashes
Steve Friedl's Unixwiz.net Tech Tips. An Illustrated Guide to Cryptographic Hashes ... With the recent news of weaknesses in some common security algorithms ...
similarity:
popularity:
security
cryptography
crypto
hash
encryption
reference
programming
tutorial
algorithms
md5
|
Moserware: A Stick Figure Guide to the Advanced Encryption Standard (AES)
No information avaiable
similarity:
popularity:
security
cryptography
aes
encryption
tutorial
crypto
comic
algorithms
humor
programming
|
Solitaire
Explanation and source code for the crypto system used in Cryptonomicon. ... Schneier.com is a personal website. Opinions expressed are not necessarily those of BT. ...
similarity:
popularity:
cryptography
security
encryption
algorithm
crypto
programming
cryptonomicon
solitaire
privacy
algorithms
|
FreeOTFE
FreeOTFE: A free 'on-the-fly' transparent disk encryption program for PCs and PDAs. ... portable - Not only does FreeOTFE offer "portable mode", eliminating ...
similarity:
popularity:
encryption
security
windows
software
opensource
crypto
cryptography
linux
tools
free
|
The International PGP Home Page
Contains updated information, FAQs and relevant links regarding the latest PGP versions.
similarity:
popularity:
security
pgp
encryption
software
privacy
crypto
tools
cryptography
opensource
freeware
|