Home - Science - Cryptography |
Page 5 81-100 of 176 Back | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | Next 20 |
81. Arimta Crypto cryptography component with focus on interoperability. Supports MD5 hashing and AES (Rijndael) encryption / decryption with custom IV, CBC mode, and PKCS7 padding. Processes data in Hex, Base64, Unicode string, or binary formats. By Arimta Technology. Component, Commercial http://www.arimta.com/?go=Crypto |
82. Document Moved Document Moved. The document formerly at this location has beenmoved to http//www.trincoll.edu/depts/cpsc/cryptography/. http://www.trincoll.edu/~cpsc/cryptography/ | |
|
83. Page Not Found Toolkits for SSL, general cryptography, and PKI. Commercial http://www.rsasecurity.com/products/bsafe/ | |
|
84. Cryptology Pointers Pseudorandom Functions Boolean functions. PublicKey cryptography, PKCBased on Some Special Mathematical Structures. Public-Key Encryption http://www.tcs.hut.fi/~helger/crypto/ | |
|
85. [quant-ph/0101098] Quantum Cryptography A recent overview of quantum cryptography. http://arxiv.org/abs/quant-ph/0101098 | |
|
86. Cryptography Resources cryptography Resources. Indexes. Other page. International cryptographyby Tatu Ylönen and Tomi Salo has good introductory material. http://www.scs.carleton.ca/~csgs/resources/crypt.html | |
|
87. MCCCC SECOND ANNOUNCEMENT Illinois State University, Normal, Illinois, USA; 1416 October 1999. Abstracts (DVI,PS). http://www.math.ilstu.edu/~saad/MCCCC.html | |
|
88. Cryptography - Home The Microsoft Research cryptography Group studies and develops methods to enhanceuser and system privacy and security. Search MSR. Home. cryptography. http://research.microsoft.com/crypto/ | |
|
89. Mod_ssl: The Apache Interface To OpenSSL The module provides strong cryptography for the Apache 1.3 webserver via SSL and TLS protocols, it was developed using OpenSSL, which is based on SSLeay. Free / Open Source (Ralf Engelschall, Ben Laurie) http://www.modssl.org/ | |
|
90. Theory Of Cryptography Library Theory of cryptography Library. This library is no longer accepting new submissions. Thisweb page provides access to recent work on Theory of cryptography. http://philby.ucsd.edu/cryptolib/ | |
|
91. Elliptic Curves And Their Applications To Cryptography: An Introduction Web text by Andreas Enge. http://www.lix.polytechnique.fr/Labo/Andreas.Enge/buch/buch/buch.html | |
|
92. Index Of Crypto Papers Available Online Subscribe. Current Issue. Back Issues. cryptography and Computer Security Resources.Contact Information. Index of cryptography Papers Available Online. http://www.schneier.com/biblio/ | |
|
93. Journal Of Discrete Mathematical Sciencies & Cryptography (Taru) Author information, recent tables of contents (PDF). http://www.tarupublications.com/jdmsc.html | |
|
94. Security Pitfalls In Cryptography Security Pitfalls in cryptography. by Bruce Schneier. Attacks Against thecryptography. Sometimes, products even get the cryptography wrong. http://www.schneier.com/essay-pitfalls.html | |
|
95. AMS Special Session On Cryptography And Number Theory AMS Special Session. Ohio State University, Columbus, Ohio; 2123 September 2001. http://euclid.butler.edu/~sorenson/ams.html | |
|
96. Oreilly.com -- Online Catalog: Java Cryptography Java cryptography teaches you how to write secure programs using Java scryptographic tools. It Email This Page. Java cryptography. By http://www.oreilly.com/catalog/javacrypt/ | |
|
97. A Short History Of Cryptography A brief historical analysis of the management of cryptography. http://www.all.net/books/ip/Chap2-1.html | |
|
98. International Cryptography Freedom INTERNATIONAL cryptography FREEDOM. Last Updated 27 July 2003 Add UnitedStates 22. UNITED STATES UNRESTRICTED cryptography. Program, URL, Notes. http://jya.com/crypto-free.htm | |
|
99. Quantum Informatics At The University Of Aarhus Performs research on quantum computing with an emphasis on quantum cryptography. http://www.cki.au.dk/ |
100. How To Make A Mint: The Cryptography Of Anonymous Electronic Cash 7200. HOW TO MAKE A MINT THE cryptography OF ANONYMOUS ELECTRONIC CASH. signature.Digital signatures are based on public key cryptography. http://jya.com/nsamint.htm | |
|
Page 5 81-100 of 176 Back | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | Next 20 |