Topics in cryptography - Wikipedia, the free ...
No information avaiable
http://en.wikipedia.org/wiki/Topics_in_cryptography
popularity:
cryptography
security
crypto
wikipedia
computer
wiki
networking
hacking
math
research
|
Schneier.com
Monthly e-mail newsletter written by Bruce Schneier. Back issues available on site. ... After nine years of publication and with 125,000 readers, Crypto-Gram is the most popular ...
similarity:
popularity:
security
cryptography
news
privacy
crypto
blog
technology
schneier
blogs
newsletter
|
FIPS 140-2 - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
fips
security
cryptography
encryption
standard
wikipedia
crypto
hsm
government
research
|
Alice and Bob - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
cryptography
security
reference
wikipedia
alice
encryption
networking
culture
bob
email
|
Visual Cryptography
One image contains random pixels and the other image contains the secret ... It is impossible to retrieve the secret information from one of the images. ...
similarity:
popularity:
cryptography
image
crypto
visual
english
encrypt
security
important
toread
vision
|
Steganography - Wikipedia, the free encyclopedia
The word steganography is of Greek origin and means "concealed writing" ... Retrieved from "http://en.wikipedia.org/wiki/Steganography" ...
similarity:
popularity:
steganography
security
cryptography
encryption
wikipedia
reference
article
cool
code
wiki
|
bouncycastle.org
Home of open source libraries of the Legion of the Bouncy Castle and their Java cryptography and C# cryptography resources
similarity:
popularity:
java
security
cryptography
encryption
crypto
programming
api
opensource
library
development
|
LASEC
FÉDÉRALE DE LAUSANNE. http://lasecwww.epfl.ch/ gavoine/rfid ... Tag-to-Reader channel: up to a few meters. http://lasecwww.epfl.ch/ gavoine/rfid ...
similarity:
popularity:
security
cryptography
research
reference
password
technology
computer
laboratory
epfl
website
|
Matasano Security LLC - Chargen - Enough With The Rainbow Tables: What You Need To Know About Secure Password Schemes
No information avaiable
similarity:
popularity:
security
cryptography
password
programming
hashing
crypto
passwords
web
hash
encryption
|
Victor Shoup's Home Page
victor@shoup.net. Current Address: New York University. Courant ... A book introducing basic concepts from computational number theory and algebra, ...
similarity:
popularity:
math
cryptography
research
crypto
people
programming
theory
mathematics
papers
security
|
Introduction
NaCl advances the state of the art by improving security, by improving usability, ... NaCl is part of the CACE (Computer Aided Cryptography Engineering) ...
similarity:
popularity:
security
cryptography
crypto
library
programming
encryption
software
network
free
opensource
|