|
No information avaiable
http://en.wikipedia.org/wiki/FIPS_140-2
popularity:
fips
security
cryptography
encryption
standard
wikipedia
crypto
hsm
government
research
|
|
<a class="ot-issue-link" href="http://code.google.com/p/as3crypto/issues/detail?id=12#c0">issue 12</a> (Does it support reading keys from a keystore? ...
similarity:
popularity:
as3
actionscript
encryption
security
flash
flex
library
cryptography
crypto
opensource
|
|
No information avaiable
similarity:
popularity:
linux
security
filesystem
encryption
crypto
kernel
privacy
cryptography
opensource
storage
|
|
MIT PGP Public Key Server. Help: Extracting keys / Submitting keys / Email ... Related Info: Information about PGP / MIT distribution site for PGP. Extract a key ...
similarity:
popularity:
pgp
security
gpg
keyserver
encryption
cryptography
search
crypto
privacy
mit
|
|
The Entropy Key is a small, unobtrusive and easily installed USB stick that ... It has been developed by UK-based Simtec Electronics, a design consultancy and ...
similarity:
popularity:
security
hardware
entropy
usb
linux
cryptography
encryption
crypto
electronics
random
|
|
free C++ library for cryptography: includes ciphers, message authentication codes, one-way hash functions, public-key ... cryptopp-users@googlegroups.com ...
similarity:
popularity:
c++
cryptography
library
programming
security
development
opensource
free
crypto
encryption
|
|
Provides details of the security research carries out by this group. ... The Applied Crypto Group is a part of the Security Lab in the Computer Science ...
similarity:
popularity:
security
crypto
cryptography
computerscience
stanford
education
|
|
the PKI page ... The PKI page. This page contains links to various sites and documents which are ... Some links may be missing, other links may be out of date ...
similarity:
popularity:
pki
security
cryptography
ssl
x509
ca
reference
encryption
crypto
standards
|
|
No information avaiable
similarity:
popularity:
c#
security
.net
hash
encryption
programming
cryptography
crypto
howto
dotnet
|
|
No information avaiable
similarity:
popularity:
security
cryptography
java
timing
programming
hacking
attack
crypto
statistics
python
|
|
Designed to collect and disseminate computer security information and resources to help users better protect their data and systems.
similarity:
popularity:
security
nist
standards
reference
government
computer
infosec
internet
technology
cryptography
|