HMAC - Wikipedia, the free encyclopedia
As with any MAC, it may be used to simultaneously verify both the ... Retrieved from "http://en.wikipedia.org/wiki/HMAC" Categories: Message authentication ...
http://en.wikipedia.org/wiki/HMAC
popularity:
security
hmac
hash
crypto
algorithms
authentication
encryption
cryptography
programming
wikipedia
|
FIPS 140-2 - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
fips
security
cryptography
encryption
standard
wikipedia
crypto
hsm
government
research
|
How We Learned to Cheat at Online Poker: A Study in Software Security [Cigital]
Poker is a card game that many people around the world enjoy. Poker is played at kitchen tables, in casinos, and cardrooms -- and more recently, the Web. ...
similarity:
popularity:
poker
security
programming
random
games
interesting
algorithm
algorithms
toread
cryptography
|
OpenSSL: The Open Source toolkit for SSL/TLS
Open source toolkit for SSL/TLS.
similarity:
popularity:
ssl
security
openssl
opensource
encryption
software
programming
linux
tools
cryptography
|
Jasypt: Java simplified encryption - How to encrypt user passwords
Almost all modern web applications need, in one way or another, to encrypt their ... We could say that, from the moment that an application has users, and ...
similarity:
popularity:
security
java
encryption
password
programming
howto
passwords
cryptography
development
tips
|
Hash'em all! Free online text and file hashing
Free online text and file hashing. Supports 35 algorithms, unicode, null ... For informations or comments please contact info@hashemall.com. Seen on ULB ...
similarity:
popularity:
hash
cryptography
sha
md5
security
encryption
online
generator
tools
web
|
Botan
Botan is a BSD-licensed crypto library written in C++ ... Botan 1.8.3: Skein-512, XTS mode, new Python build system ... Botan Now Included in Fedora ...
similarity:
popularity:
c++
library
cryptography
crypto
security
programming
software
encryption
development
opensource
|
SecurityFocus interview with Solar Designer on John the Ripper 1.7
No information avaiable
similarity:
popularity:
security
password
cryptography
programming
passwords
code
crypto
rainbowtable
generator
generators
|
Steganography - Wikipedia, the free encyclopedia
The word steganography is of Greek origin and means "concealed writing" ... Retrieved from "http://en.wikipedia.org/wiki/Steganography" ...
similarity:
popularity:
steganography
security
cryptography
encryption
wikipedia
reference
article
cool
code
wiki
|
Network Security at Stanford
Provides details of the security research carries out by this group. ... The Applied Crypto Group is a part of the Security Lab in the Computer Science ...
similarity:
popularity:
security
crypto
cryptography
computerscience
stanford
education
|
The GNU Privacy Guard - GnuPG.org
GnuPG is a complete and free replacement for PGP.
similarity:
popularity:
security
encryption
pgp
software
opensource
privacy
gnu
gpg
cryptography
tools
|