HMAC - Wikipedia, the free encyclopedia
As with any MAC, it may be used to simultaneously verify both the ... Retrieved from "http://en.wikipedia.org/wiki/HMAC" Categories: Message authentication ...
http://en.wikipedia.org/wiki/HMAC
popularity:
security
hmac
hash
crypto
algorithms
authentication
encryption
cryptography
programming
wikipedia
|
Paj's Home
No information avaiable
similarity:
popularity:
security
programming
javascript
cryptography
sha1
md5
authentication
people
encryption
webmaster
|
CrypTool - Homepage
The application Cryptool is a free e-learning application for Windows. You can use it to apply and analyze cryptographic algorithms. The current version of Cryptool ...
similarity:
popularity:
cryptography
security
tools
encryption
crypto
software
opensource
tutorials
tutorial
learning
|
FreeOTFE
FreeOTFE: A free 'on-the-fly' transparent disk encryption program for PCs and PDAs. ... portable - Not only does FreeOTFE offer "portable mode", eliminating ...
similarity:
popularity:
encryption
security
windows
software
opensource
crypto
cryptography
linux
tools
free
|
jsCrypto
No information avaiable
similarity:
popularity:
javascript
cryptography
encryption
security
crypto
library
programming
opensource
aes
js
|
JavaScrypt: Browser-Based Cryptography Tools
No information avaiable
similarity:
popularity:
javascript
cryptography
security
encryption
crypto
web
tools
programming
code
aes
|
NSA :: Overview
NSA@home is a fast FPGA-based SHA-1 and MD5 bruteforce cracker. ... Contact me: nsa unaligned org (figure out where to put the @ and .) irc.unaligned.org #nsa ...
similarity:
popularity:
security
hardware
fpga
crypto
cryptography
hash
hack
diy
md5
electronics
|
Public key infrastructure - Wikipedia, the free encyclopedia
This article's external links may not follow Wikipedia's content policies or guidelines. ... Retrieved from "http://en.wikipedia.org/wiki/Public_key_infrastructure" ...
similarity:
popularity:
pki
security
cryptography
encryption
crypto
certificate
wikipedia
reference
wiki
ssl
|
NIST.gov - Computer Security Division - Computer Security Resource Center
No information avaiable
similarity:
popularity:
hash
security
nist
sha3
cryptography
crypto
algorithm
competition
algorithms
sha-3
|
A Lesson In Timing Attacks (or, Don't use MessageDigest.isEquals) | codahale.com
No information avaiable
similarity:
popularity:
security
cryptography
java
timing
programming
hacking
attack
crypto
statistics
python
|
The International PGP Home Page
Contains updated information, FAQs and relevant links regarding the latest PGP versions.
similarity:
popularity:
security
pgp
encryption
software
privacy
crypto
tools
cryptography
opensource
freeware
|