finds you similar websites
auto-suggest    top sites

Jun 9th, 2025

16 Popular Sites Like http://users.telenet.be/d...

Our robot has studied the web and discovered tons of quality cryptography and image sites like this one. Come and discover additional webpages that are related to this one.

Displaying 21 to 30 of 500 alternatives to http://users.telenet.be/d.rijmenant.... (Updated: Jun 9th, 2025)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like :
  Visual Cryptography
One image contains random pixels and the other image contains the secret ... It is impossible to retrieve the secret information from one of the images. ...
http://users.telenet.be/d.rijmenants/en/visualcrypto.htm
popularity:
cryptography
image
crypto
visual
english
encrypt
security
important
toread
vision
new search by a custom tag signature
  Mobilefish.com - A tutorial about Bouncy Castle Crypto. Cryptography basics. Includes examples.
No information avaiable
similarity:
popularity:
java
cryptography
crypto
security
bouncycastle
tutorial
j2me
programming
opensource
jce
  JavaScrypt: Browser-Based Cryptography Tools
No information avaiable
similarity:
popularity:
javascript
cryptography
security
encryption
crypto
web
tools
programming
code
aes
  Rainbow table - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
security
cryptography
wikipedia
cracking
hash
rainbow
passwords
crypto
password
encryption
  Crypto++ Library 5.5.2 - a Free C++ Class Library of Cryptographic Schemes
free C++ library for cryptography: includes ciphers, message authentication codes, one-way hash functions, public-key ... cryptopp-users@googlegroups.com ...
similarity:
popularity:
c++
cryptography
library
programming
security
development
opensource
free
crypto
encryption
  Introduction
NaCl advances the state of the art by improving security, by improving usability, ... NaCl is part of the CACE (Computer Aided Cryptography Engineering) ...
similarity:
popularity:
security
cryptography
crypto
library
programming
encryption
software
network
free
opensource
  A Lesson In Timing Attacks (or, Don't use MessageDigest.isEquals) | codahale.com
No information avaiable
similarity:
popularity:
security
cryptography
java
timing
programming
hacking
attack
crypto
statistics
python
  jsCrypto
No information avaiable
similarity:
popularity:
javascript
cryptography
encryption
security
crypto
library
programming
opensource
aes
js
  How PGP works
No information avaiable
similarity:
popularity:
pgp
security
cryptography
encryption
reference
crypto
privacy
tools
tutorial
documentation
  Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
similarity:
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
< prev ... 1 2 3 4 5 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.