RSA Laboratories - Crypto FAQ
No information avaiable
http://www.rsa.com/rsalabs/node.asp?id=2152
popularity:
cryptography
security
rsa
faq
crypto
reference
encryption
programming
theory
laboratories
|
cr.yp.to
Welcome to cr.yp.to. Some popular pages that you might be looking for: United Airlines sucks (part 40); D. J. Bernstein's home page; the qmail home page; ...
similarity:
popularity:
security
software
linux
djb
crypto
unix
programming
cryptography
dns
qmail
|
Visual Cryptography
One image contains random pixels and the other image contains the secret ... It is impossible to retrieve the secret information from one of the images. ...
similarity:
popularity:
cryptography
image
crypto
visual
english
encrypt
security
important
toread
vision
|
Jasypt: Java simplified encryption - Main
IMPORTANT: It is strongly advised not to use version 1.4 of the Apache Commons ... This problem will not arise if you use the default version of this library ...
similarity:
popularity:
java
security
encryption
cryptography
opensource
library
hibernate
framework
spring
programming
|
FreeOTFE
FreeOTFE: A free 'on-the-fly' transparent disk encryption program for PCs and PDAs. ... portable - Not only does FreeOTFE offer "portable mode", eliminating ...
similarity:
popularity:
encryption
security
windows
software
opensource
crypto
cryptography
linux
tools
free
|
HMAC - Wikipedia, the free encyclopedia
As with any MAC, it may be used to simultaneously verify both the ... Retrieved from "http://en.wikipedia.org/wiki/HMAC" Categories: Message authentication ...
similarity:
popularity:
security
hmac
hash
crypto
algorithms
authentication
encryption
cryptography
programming
wikipedia
|
SecurityFocus interview with Solar Designer on John the Ripper 1.7
No information avaiable
similarity:
popularity:
security
password
cryptography
programming
passwords
code
crypto
rainbowtable
generator
generators
|
FIPS 140-2 - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
fips
security
cryptography
encryption
standard
wikipedia
crypto
hsm
government
research
|
Mobilefish.com - A tutorial about Bouncy Castle Crypto. Cryptography basics. Includes examples.
No information avaiable
similarity:
popularity:
java
cryptography
crypto
security
bouncycastle
tutorial
j2me
programming
opensource
jce
|
Cryptome
Hosts essays, articles, and the text of legislation that covers cryptology, dual-use technologies, national security, and intelligence.
similarity:
popularity:
security
politics
government
news
privacy
intelligence
crypto
conspiracy
reference
cryptography
|
How To: Hash Data with Salt (C#/VB.NET)
No information avaiable
similarity:
popularity:
c#
security
.net
hash
encryption
programming
cryptography
crypto
howto
dotnet
|