RFC 3174 (rfc3174) - US Secure Hash Algorithm...
No information avaiable
http://www.faqs.org/rfcs/rfc3174.html
popularity:
rfc
sha1
security
hash
algorithm
cryptography
encryption
network
research
intrusiondetection
|
Public-key cryptography - Wikipedia, the free encyclopedia
An unpredictable (typically a large randomly chosen) number is used to begin ... Retrieved from "http://en.wikipedia.org/wiki/Public-key_cryptography" ...
similarity:
popularity:
cryptography
security
encryption
wikipedia
crypto
reference
pgp
pki
privacy
public-key
|
NIST.gov - Computer Security Division - Computer Security Resource Center
No information avaiable
similarity:
popularity:
hash
security
nist
sha3
cryptography
crypto
algorithm
competition
algorithms
sha-3
|
The GNU Privacy Guard - GnuPG.org
GnuPG is a complete and free replacement for PGP.
similarity:
popularity:
security
encryption
pgp
software
opensource
privacy
gnu
gpg
cryptography
tools
|
GData: An Online MD5 Hash Database
GDataOnline.com is the world's largest, fastest, online based MD5 reverse lookup project currently sporting 1133 million unique entries!
similarity:
popularity:
md5
security
hash
hacking
cryptography
database
tools
password
hack
crack
|
FreeOTFE
FreeOTFE: A free 'on-the-fly' transparent disk encryption program for PCs and PDAs. ... portable - Not only does FreeOTFE offer "portable mode", eliminating ...
similarity:
popularity:
encryption
security
windows
software
opensource
crypto
cryptography
linux
tools
free
|
Diceware Passphrase Home Page
Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...
similarity:
popularity:
security
password
passphrase
encryption
privacy
crypto
reference
tools
cryptography
passwords
|
Jasypt: Java simplified encryption - Main
IMPORTANT: It is strongly advised not to use version 1.4 of the Apache Commons ... This problem will not arise if you use the default version of this library ...
similarity:
popularity:
java
security
encryption
cryptography
opensource
library
hibernate
framework
spring
programming
|
bouncycastle.org
Home of open source libraries of the Legion of the Bouncy Castle and their Java cryptography and C# cryptography resources
similarity:
popularity:
java
security
cryptography
encryption
crypto
programming
api
opensource
library
development
|
PGP Corporation - Home Page
Helps companies secure e-business operations through firewall, encryption, and intrusion detection.
similarity:
popularity:
security
encryption
pgp
software
privacy
tools
cryptography
internet
email
technology
|
Introduction
NaCl advances the state of the art by improving security, by improving usability, ... NaCl is part of the CACE (Computer Aided Cryptography Engineering) ...
similarity:
popularity:
security
cryptography
crypto
library
programming
encryption
software
network
free
opensource
|