finds you similar websites
auto-suggest    top sites

May 7th, 2024

11 Popular Sites Like http://csrc.nist.gov/grou...

The team has explored the net and turned up a lot of noted hash and security sites like this one. Come by and explore websites that are similar to this one.

Displaying 21 to 30 of 500 alternatives to http://csrc.nist.gov/groups/ST/hash.... (Updated: May 7th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like :
  NIST.gov - Computer Security Division - Compu...
No information avaiable
http://csrc.nist.gov/groups/ST/hash/sha-3/index.html
popularity:
hash
security
nist
sha3
cryptography
crypto
algorithm
competition
algorithms
sha-3
new search by a custom tag signature
  Hash'em all! Free online text and file hashing
Free online text and file hashing. Supports 35 algorithms, unicode, null ... For informations or comments please contact info@hashemall.com. Seen on ULB ...
similarity:
popularity:
hash
cryptography
sha
md5
security
encryption
online
generator
tools
web
  One-time pad - Wikipedia, the free encyclopedia
This article may require cleanup to meet Wikipedia's quality standards. Please improve ... Please help improve this article by adding reliable references. ...
similarity:
popularity:
cryptography
encryption
wikipedia
security
programming
crypto
algorithm
pad
wiki
reference
  Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
similarity:
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
  Cryptography and Network Security, Fourth Edition
No information avaiable
similarity:
popularity:
cryptography
security
resources
books
reference
education
crypto
book
programming
network
  Hash functions.
In a previous job, I was asked to look at hashing functions and got into a ... I had advocated the used of LFSRs or CRCs that would be customized to the size ...
similarity:
popularity:
hash
programming
algorithms
algorithm
hashing
c
code
math
performance
c++
  .:: General Purpose Hash Function Algorithms - By Arash Partow ::.
The General Hash Function Algorithm library contains implementations for a series of commonly used additive and ... www.partow.net. Home :. .: Links : ...
similarity:
popularity:
hash
programming
algorithms
hashing
algorithm
reference
library
java
code
c++
  Network Security at Stanford
Provides details of the security research carries out by this group. ... The Applied Crypto Group is a part of the Security Lab in the Computer Science ...
similarity:
popularity:
security
crypto
cryptography
computerscience
stanford
education
  Public-key cryptography - Wikipedia, the free encyclopedia
An unpredictable (typically a large randomly chosen) number is used to begin ... Retrieved from "http://en.wikipedia.org/wiki/Public-key_cryptography" ...
similarity:
popularity:
cryptography
security
encryption
wikipedia
crypto
reference
pgp
pki
privacy
public-key
  bouncycastle.org
Home of open source libraries of the Legion of the Bouncy Castle and their Java cryptography and C# cryptography resources
similarity:
popularity:
java
security
cryptography
encryption
crypto
programming
api
opensource
library
development
  Topics in cryptography - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
cryptography
security
crypto
wikipedia
computer
wiki
networking
hacking
math
research
< prev ... 1 2 3 4 5 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.