Center for Information Technology Policy » L...
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
http://citp.princeton.edu/memory/
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
|
Advanced Encryption Standard - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
aes
cryptography
encryption
security
crypto
wikipedia
programming
reference
algorithm
computer
|
Flylogic Engineering
Email: tech at flylogic.net. State Of The Art Optics ... Flylogic Engineering will give you a reliable quote and provide results faster ...
similarity:
popularity:
security
hardware
encryption
reverseengineering
hack
flylogic
embedded
engineering
|
TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP, Mac OS X and Linux - Documentation
No information avaiable
similarity:
popularity:
encryption
security
opensource
tools
software
truecrypt
filesystem
cryptography
freeware
privacy
|
Rainbow table - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
security
cryptography
wikipedia
cracking
hash
rainbow
passwords
crypto
password
encryption
|
Matasano Security LLC - Chargen - Enough With The Rainbow Tables: What You Need To Know About Secure Password Schemes
No information avaiable
similarity:
popularity:
security
cryptography
password
programming
hashing
crypto
passwords
web
hash
encryption
|
Cryptology ePrint Archive
Provides access to author-submitted research papers in cryptology. ... International Association for Cryptologic Research (IACR) [ Cryptology ePrint archive ] ...
similarity:
popularity:
cryptography
security
crypto
cryptology
research
papers
science
archive
reference
eprint
|
Black Hat Briefings & Training
Features information about the annual security convention, and also highlights breaking security research submitted by leading corporate professionals, government ...
similarity:
popularity:
security
hacking
network
hack
conference
conferences
hacker
privacy
reference
blackhat
|
COPACOBANA - Special-Purpose Hardware for Code-Breaking
COPACOBANA - special-purpose hardware for code-breaking ... copacobana.org goes online. The website is intented to provide information on the COPACOBANA device - A cost ...
similarity:
popularity:
fpga
hardware
crypto
cryptography
encryption
security
des
distributed
parallel
cracking
|
FIPS 140-2 - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
fips
security
cryptography
encryption
standard
wikipedia
crypto
hsm
government
research
|
eCryptfs
No information avaiable
similarity:
popularity:
linux
security
filesystem
encryption
crypto
kernel
privacy
cryptography
opensource
storage
|