|
No information avaiable
http://en.wikipedia.org/wiki/FIPS_140-2
popularity:
fips
security
cryptography
encryption
standard
wikipedia
crypto
hsm
government
research
|
|
Open source on-the-fly disk encryption software for Windows XP/2000 and Linux.
similarity:
popularity:
security
encryption
software
opensource
tools
cryptography
windows
linux
freeware
privacy
|
|
Explanation and source code for the crypto system used in Cryptonomicon. ... Schneier.com is a personal website. Opinions expressed are not necessarily those of BT. ...
similarity:
popularity:
cryptography
security
encryption
algorithm
crypto
programming
cryptonomicon
solitaire
privacy
algorithms
|
|
No information avaiable
similarity:
popularity:
cryptography
security
crypto
wikipedia
computer
wiki
networking
hacking
math
research
|
|
FreeOTFE: A free 'on-the-fly' transparent disk encryption program for PCs and PDAs. ... portable - Not only does FreeOTFE offer "portable mode", eliminating ...
similarity:
popularity:
encryption
security
windows
software
opensource
crypto
cryptography
linux
tools
free
|
|
Home of open source libraries of the Legion of the Bouncy Castle and their Java cryptography and C# cryptography resources
similarity:
popularity:
java
security
cryptography
encryption
crypto
programming
api
opensource
library
development
|
|
Provides access to author-submitted research papers in cryptology. ... International Association for Cryptologic Research (IACR) [ Cryptology ePrint archive ] ...
similarity:
popularity:
cryptography
security
crypto
cryptology
research
papers
science
archive
reference
eprint
|
|
This article's external links may not follow Wikipedia's content policies or guidelines. ... Retrieved from "http://en.wikipedia.org/wiki/Public_key_infrastructure" ...
similarity:
popularity:
pki
security
cryptography
encryption
crypto
certificate
wikipedia
reference
wiki
ssl
|
|
The word steganography is of Greek origin and means "concealed writing" ... Retrieved from "http://en.wikipedia.org/wiki/Steganography" ...
similarity:
popularity:
steganography
security
cryptography
encryption
wikipedia
reference
article
cool
code
wiki
|
|
No information avaiable
similarity:
popularity:
security
cryptography
encryption
nist
crypto
toolkit
standards
computer
algorithms
specification
|
|
Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...
similarity:
popularity:
security
password
passphrase
encryption
privacy
crypto
reference
tools
cryptography
passwords
|