NIST.gov - Computer Security Division - Compu...
No information avaiable
http://csrc.nist.gov/groups/ST/hash/sha-3/index.html
popularity:
hash
security
nist
sha3
cryptography
crypto
algorithm
competition
algorithms
sha-3
|
Diceware Passphrase Home Page
Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...
similarity:
popularity:
security
password
passphrase
encryption
privacy
crypto
reference
tools
cryptography
passwords
|
A Lesson In Timing Attacks (or, Don't use MessageDigest.isEquals) | codahale.com
No information avaiable
similarity:
popularity:
security
cryptography
java
timing
programming
hacking
attack
crypto
statistics
python
|
Cryptome
Hosts essays, articles, and the text of legislation that covers cryptology, dual-use technologies, national security, and intelligence.
similarity:
popularity:
security
politics
government
news
privacy
intelligence
crypto
conspiracy
reference
cryptography
|
How We Learned to Cheat at Online Poker: A Study in Software Security [Cigital]
Poker is a card game that many people around the world enjoy. Poker is played at kitchen tables, in casinos, and cardrooms -- and more recently, the Web. ...
similarity:
popularity:
poker
security
programming
random
games
interesting
algorithm
algorithms
toread
cryptography
|
md5.rednoize.com - reverse engineer md5 hashes - powered by rednoize.com
md5.rednoize.com. Search for md5 hashes. Type search term. Search. MD5. SHA1. Search in 56,091,995 md5/sha1 hashes. 17,738,931 searches answered since feb 2005. ...
similarity:
popularity:
md5
security
tools
password
hacking
crypto
search
crack
hash
sha1
|
RSA Laboratories - Crypto FAQ
No information avaiable
similarity:
popularity:
cryptography
security
rsa
faq
crypto
reference
encryption
programming
theory
laboratories
|
TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP, Mac OS X and Linux
Open source on-the-fly disk encryption software for Windows XP/2000 and Linux.
similarity:
popularity:
security
encryption
software
opensource
tools
cryptography
windows
linux
freeware
privacy
|
HASHCRACK.COM - Reverse Hash Lookup for MD5, SHA1, MySQL, NTLM and Lanman-Password-Hashes
Hashcrack.com - reverse hash lookup for md5, sha1, ntlm and LanMan Hashes
similarity:
popularity:
md5
hash
security
crack
password
tools
database
hack
hacking
cryptography
|
Introduction
NaCl advances the state of the art by improving security, by improving usability, ... NaCl is part of the CACE (Computer Aided Cryptography Engineering) ...
similarity:
popularity:
security
cryptography
crypto
library
programming
encryption
software
network
free
opensource
|
How PGP works
No information avaiable
similarity:
popularity:
pgp
security
cryptography
encryption
reference
crypto
privacy
tools
tutorial
documentation
|