Home - Science - Cryptography |
Page 9 161-176 of 176 Back | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 |
161. Phaos Technology Corporation - Java Security, Identity Management, Data Security SSL, TLS, S/MIME, digital certificate, PKI, and cryptography libraries. commercial http://www.phaos.com/index.html | |
|
162. Cryonics And Cryptography Cryonics, cryptography, and Maximum Likelihood Estimation. In cryptography,the person who wants to send a secret message transforms it. http://www.merkle.com/cryo/cryptoCryo.html | |
|
163. LITQ Publications, laboratory staff members, and Java applets related to quantum cryptography, quantum information, quantum teleportation, computational complexity, algorithmics, and graph theory. http://www.iro.umontreal.ca/labs/theorique/ | |
|
164. Www.clark.net/pub/cme/html/timeline.html Elliptic curve cryptography FAQ v1.12 22nd December 1997Elliptic curve cryptography FAQ v1.12 22nd December 1997. by George Barwood. Nowwe are in a position to do some cryptography! Alice, Bob, Cathy, David http://www.clark.net/pub/cme/html/timeline.html |
165. Cryptography And Coding Theory With MAPLE Page Some coding theory and cryptography links, most of which use Maple. http://web.usna.navy.mil/~wdj/crypto.htm | |
|
166. Springer-Verlag - Number Theory & Combinatorics Neal Koblitz. A textbook for a course, or selfinstruction, in cryptography with emphasis on algebraic methods. http://www.springer-ny.com/detail.tpl?isbn=3540634460 |
167. Piracy.com: International Cryptography Freedom Links to cryptography related downloads and information from around the world. http://www.piracy.com | |
|
168. Timing Analysis Of Keystrokes And Timing Attacks On SSH PDF format Paper describing research into applying trafficanalysis techniques to interactive SSH connections in order to infer information about the encrypted connection contents. Concludes that the keystroke timing data observable from today's SSH implementations reveals a dangerously significant amount of information about user terminal sessions. http://packetstormsecurity.nl/papers/cryptography/ssh-timing.pdf |
169. CryptoSys Cryptography Software Tools For Visual Basic And C/C++ Developers CryptoSys is a commercial site which offers cryptography software tools for Visual Basic developers. Included are many symmetric algorithms (Rijndael, DES, 3DES, and Blowfish) together with various oneway hash funcitons (SHA-1 and SHA-256). http://www.cryptosys.net/ | |
|
170. Crypto Law Survey Gives an overview of existing laws and regulations with entries per country on import/export controls, domestic laws, developments to restrict or promote cryptography. http://rechten.uvt.nl/koops/cryptolaw/ | |
|
171. INRIA - Projet CODES CODES Coding and cryptography research group. Publications and research reports. http://www.inria.fr/Equipes/CODES-eng.html | |
|
172. Counterpane Internet Security, Inc. View Our Webcast. Counterpane Presentation Network Events Processed Since1/1/2004. Counterpane is your single source network security partner. http://www.counterpane.com/ | |
|
173. WebWorks.com | Page Not Found This page has not been found at www.webworks.com. Please click ona link above to continue, visit the search page, or send email http://www.quadralay.com/www/Crypt/Crypt.html | |
|
174. Phil Karn, KA9Q Phil Karn, KA9Q Karn (at) qualcomm (dot) com. My wife, Kimberly,and me in New Orleans, May 2000 Photo by Mary Jo Wilson If you http://people.qualcomm.com/karn/ |
175. Joel's Page Books Related. My latest book, GPS for Dummies will be out by the endof May 2004 Geocaching for Dummies, which I m currently finishing http://www.eskimo.com/~joelm/ | |
|
176. Redirecting To Http//www.cccns.uwm.edu If Your Browser Doesn T Redirecting to http//www.cccns.uwm.edu If your browser doesn t understandthe redirect, you may want to go to http//www.cccns.uwm.edu directly. http://www.cs.uwm.edu/~cccns/ | |
|
Page 9 161-176 of 176 Back | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 |