Solitaire
Explanation and source code for the crypto system used in Cryptonomicon. ... Schneier.com is a personal website. Opinions expressed are not necessarily those of BT. ...
http://www.schneier.com/solitaire.html
popularity:
cryptography
security
encryption
algorithm
crypto
programming
cryptonomicon
solitaire
privacy
algorithms
|
JavaScrypt: Browser-Based Cryptography Tools
No information avaiable
similarity:
popularity:
javascript
cryptography
security
encryption
crypto
web
tools
programming
code
aes
|
Diceware Passphrase Home Page
Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...
similarity:
popularity:
security
password
passphrase
encryption
privacy
crypto
reference
tools
cryptography
passwords
|
Schneier.com
Monthly e-mail newsletter written by Bruce Schneier. Back issues available on site. ... After nine years of publication and with 125,000 readers, Crypto-Gram is the most popular ...
similarity:
popularity:
security
cryptography
news
privacy
crypto
blog
technology
schneier
blogs
newsletter
|
HMAC - Wikipedia, the free encyclopedia
As with any MAC, it may be used to simultaneously verify both the ... Retrieved from "http://en.wikipedia.org/wiki/HMAC" Categories: Message authentication ...
similarity:
popularity:
security
hmac
hash
crypto
algorithms
authentication
encryption
cryptography
programming
wikipedia
|
Crypto++ Library 5.5.2 - a Free C++ Class Library of Cryptographic Schemes
free C++ library for cryptography: includes ciphers, message authentication codes, one-way hash functions, public-key ... cryptopp-users@googlegroups.com ...
similarity:
popularity:
c++
cryptography
library
programming
security
development
opensource
free
crypto
encryption
|
Rainbow table - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
security
cryptography
wikipedia
cracking
hash
rainbow
passwords
crypto
password
encryption
|
The International PGP Home Page
Contains updated information, FAQs and relevant links regarding the latest PGP versions.
similarity:
popularity:
security
pgp
encryption
software
privacy
crypto
tools
cryptography
opensource
freeware
|
ScramDisk - Free Disk Encryption Software
No information avaiable
similarity:
popularity:
security
software
encryption
cryptography
crypto
disk
privacy
tools
networking
filesystem
|
A Lesson In Timing Attacks (or, Don't use MessageDigest.isEquals) | codahale.com
No information avaiable
similarity:
popularity:
security
cryptography
java
timing
programming
hacking
attack
crypto
statistics
python
|
Welcome to elonka.com
Check http://elonka.com/newfoundland to see the site in progress. ... Since September 10, 2002, the elonka.com site has had this many visitors: ...
similarity:
popularity:
cryptography
kryptos
crypto
security
games
elonka
people
blog
encryption
science
|