Home - Science - Cryptography |
Page 3 41-60 of 176 Back | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | Next 20 |
41. Chilkat Crypt -- Encryption Component With AES, RSA, Blowfish, Twofish, And Digi Supports up to 256bit AES, 2048-bit RSA public-key cryptography, and digital signature creation and validation. By Chilkat Software, Inc. Component, Commercial http://www.chilkatsoft.com/ChilkatCrypt.asp | |
|
42. WHERE TO GET PGP (Pretty Good Privacy) Use it at your own risk. The master copies of this FAQ are at http//cryptography.org/getpgp.htmand http//cryptography.org/getpgp.txt. http://www.cryptography.org/getpgp.htm | |
|
43. Page Not Found PKCS Standards http://www.rsasecurity.com/rsalabs/pkcs/index.html | |
|
44. EPIC Archive - Cryptography Policy EPIC logo. cryptography Policy. Reports on cryptography Policy EPIC, cryptography Liberty 2000 An International Survey of Encryption Policy. http://www.epic.org/crypto/ | |
|
45. Java Cryptography Extension (JCE) Provides framework and implementations for encryption, key generation and key agreement, and Message Authentication Code (MAC) algorithms. http://java.sun.com/products/jce/ | |
|
46. Quantum Cryptography In Norway Applicationoriented research at NTNU, Trondheim and Telenor, Oslo http://www.fysel.ntnu.no/Optics/qcr/ | |
|
47. DCCG Workshop, Lethbridge, July 2001 Second Lethbridge Workshop on Designs, Codes, cryptography and Graph Theory a combination of instructional lectures and research sessions. Lethbridge, Alberta; July 914, 2001. http://www.cs.uleth.ca/dccg/ | |
|
48. The Applied Cryptography Case The Applied cryptography Case Only Americans Can Type! In January14, 2000, new US crypto export regulations went into effect. http://people.qualcomm.com/karn/export/ | |
|
49. How SSL Works The article explains how secure sockets layer (SSL) employs public key cryptography techniques for internet security. (Netscape). http://developer.netscape.com/tech/security/ssl/howitworks.html | |
|
50. Avs Online: European Cryptography The European cryptography link database has been discontinued. I didnot find the time to maintain it. Sorry. I recommend the following http://www.modeemi.cs.tut.fi/~avs/eu-crypto.html | |
|
51. Elliptic Curve Cryptography FAQ V1.12 22nd December 1997 Explains the difference between an elliptical curve and an ellipse. Discusses fields, applications, choosing a fixed point, and related topics. http://www.cryptoman.com/elliptic.htm | |
|
52. Java Cryptography Extension (JCE) The Java cryptography Extension (JCE) 1.2.2 is a package that provides a frameworkand implementations for encryption, key generation and key agreement, and http://java.sun.com/products/jce/index.jsp |
53. C4I.org - Strong Cryptography Links On The Internet Dealing with cryptography, information security, cryptographers government, commercial, university, and personal sites, newsgroups, publications, programs and applications. http://www.c4i.org/erehwon/crypto.html | |
|
54. Kluwer Academic Publishers - Designs, Codes And Cryptography (Kluwer) An archival peerreviewed technical journal publishing survey and original papers. Tables of contents and abstracts from vol.10 (1997) on. Full text to subscribers. http://www.kluweronline.com/issn/0925-1022/ | |
|
55. The Cryptography Project The cryptography Project. Note This page is no longer being maintained. Go to myhome page for current pages. Denning Articles on cryptography and Wiretapping. http://www.cosc.georgetown.edu/~denning/crypto/ | |
|
56. Conference On Coding Theory, Cryptology, And Number Theory USNA, Annapolis, MD, USA; 2526 October 1998. http://web.usna.navy.mil/~wdj/talk98_30.htm | |
|
57. The Future Of Cryptography The Future of cryptography. Dorothy E. Denning Georgetown University. A new paradigmof cryptography, key escrow, is emerging and gaining acceptance in industry. http://www.cosc.georgetown.edu/~denning/crypto/Future.html | |
|
58. An Overview Of Cryptography An Overview of cryptography. Gary C. Kessler May 1998 (5 May 2004). A background information. 2. THE PURPOSE OF cryptography. cryptography http://www.garykessler.net/library/crypto.html | |
|
59. Linux 2.4: Next Generation Kernel Security Selective privileges (capabilities), cryptography, random number devices. http://www.linuxsecurity.com/feature_stories/kernel-24-security.html | |
|
60. GILC -- Cryptography And Liberty The 1999 update of this report is now available. cryptography AND LIBERTY 1998. LisaKamm created the HTML version of the Report. The Importance of cryptography. http://www.gilc.org/crypto/crypto-survey.html | |
|
Page 3 41-60 of 176 Back | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | Next 20 |