NIST.gov - Computer Security Division - Compu...
No information avaiable
http://csrc.nist.gov/groups/ST/hash/sha-3/index.html
popularity:
hash
security
nist
sha3
cryptography
crypto
algorithm
competition
algorithms
sha-3
|
NSA :: Overview
NSA@home is a fast FPGA-based SHA-1 and MD5 bruteforce cracker. ... Contact me: nsa unaligned org (figure out where to put the @ and .) irc.unaligned.org #nsa ...
similarity:
popularity:
security
hardware
fpga
crypto
cryptography
hash
hack
diy
md5
electronics
|
RSA Algorithm
No information avaiable
similarity:
popularity:
rsa
cryptography
security
encryption
algorithm
crypto
math
algorithms
programming
tutorial
|
How To: Hash Data with Salt (C#/VB.NET)
No information avaiable
similarity:
popularity:
c#
security
.net
hash
encryption
programming
cryptography
crypto
howto
dotnet
|
NIST.gov - Computer Security Division - Computer Security Resource Center
Designed to collect and disseminate computer security information and resources to help users better protect their data and systems.
similarity:
popularity:
security
nist
standards
reference
government
computer
infosec
internet
technology
cryptography
|
GData: An Online MD5 Hash Database
GDataOnline.com is the world's largest, fastest, online based MD5 reverse lookup project currently sporting 1133 million unique entries!
similarity:
popularity:
md5
security
hash
hacking
cryptography
database
tools
password
hack
crack
|
RFC 3174 (rfc3174) - US Secure Hash Algorithm 1 (SHA1)
No information avaiable
similarity:
popularity:
rfc
sha1
security
hash
algorithm
cryptography
encryption
network
research
intrusiondetection
|
Schneier.com
Monthly e-mail newsletter written by Bruce Schneier. Back issues available on site. ... After nine years of publication and with 125,000 readers, Crypto-Gram is the most popular ...
similarity:
popularity:
security
cryptography
news
privacy
crypto
blog
technology
schneier
blogs
newsletter
|
CrypTool - Homepage
The application Cryptool is a free e-learning application for Windows. You can use it to apply and analyze cryptographic algorithms. The current version of Cryptool ...
similarity:
popularity:
cryptography
security
tools
encryption
crypto
software
opensource
tutorials
tutorial
learning
|
Cryptology ePrint Archive
Provides access to author-submitted research papers in cryptology. ... International Association for Cryptologic Research (IACR) [ Cryptology ePrint archive ] ...
similarity:
popularity:
cryptography
security
crypto
cryptology
research
papers
science
archive
reference
eprint
|
Advanced Encryption Standard - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
aes
cryptography
encryption
security
crypto
wikipedia
programming
reference
algorithm
computer
|