Home - Science - Cryptography |
Page 3 41-60 of 69 Back | 1 | 2 | 3 | 4 | Next 20 |
41. Shortcut To Cryptography cryptography and Data Security(Denning) cryptographyTheory And Practice(Stinson). CRCHandbook of Applied cryptography(Menezes). http://www.subject.com/crypto/crypto.html | |
|
42. SourceForge.net: Software Map sourceforge.net/softwaremap/trove_list.php?form_cat=44 Similar pages cse p 590tu practical aspects of modern cryptographywww.cs.washington.edu/education/courses/csep590/06wi/ - Similar pages IBM Research IBM Research cryptography ResearchLists group members, current research, recent publications, and speakers and other activities at the TJ Watson Research Center. http://sourceforge.net/softwaremap/trove_list.php?form_cat=44 |
43. International Cryptography Freedom The Project was started to make open source cryptographic software freely available in situations where it difficult to obtain the software from its http://jya.com/crypto-free.htm | |
|
44. Cryptography 2007 cryptography 2007. TDA351 (Chalmers). INN150 (GU). Latest news Syllabus Examination Teachers Submission system Schedule Lectures http://www.cs.chalmers.se/Cs/Grundutb/Kurser/krypto/ | |
|
45. Cryptography - Mono NET framework cryptography can be found under a number of namespaces in several assemblies. Mono also has it s own assemblies to provide missing security http://www.mono-project.com/Cryptography | |
|
46. ECS 227 - Modern Cryptography - Winter 2000 - Phillip Rogaway ECS 227 Modern cryptography - Winter 2000. Topic for Lecture 18 (Tuseday, 3/7/00). Digital signatures. General Information. Course Information Sheet http://www.cs.ucdavis.edu/~rogaway/classes/227/winter00/ | |
|
47. Cryptography crypto quotes travis+mlcryptography; Potential Hazards of the Protect America Act Perry E. Metzger; more terrorist crypto hype Perry E. Metzger http://www.mail-archive.com/cryptography@metzdowd.com/ | |
|
48. Fact Sheet NSA Suite B Cryptography Official NSA site. Cryptographic standards, research, and resources. http://www.nsa.gov/ia/industry/crypto_suite_b.cfm | |
|
49. Netsurfer Focus On Cryptography And Privacy cryptography in the computer age typically involves the translation of the original message into a new and incomprehensible one by a mathematical algorithm http://www.netsurf.com/nsf/v01/03/nsf.01.03.html |
50. System.Security.Cryptography Namespace () The cryptography namespace provides cryptographic services, including secure encoding and decoding of data, as well as many other operations, http://msdn2.microsoft.com/en-us/library/system.security.cryptography.aspx | |
|
51. Malicious Cryptography, Part One May 8, 2006 This twopart article series looks at how cryptography is a double-edged sword it is used to make us safer, but it is also being used for http://www.securityfocus.com/infocus/1865 | |
|
52. The Cryptography Project www.cosc.georgetown.edu/~denning/crypto/ Similar pages IEEE P1363 Standard Specifications For Public Key cryptographyStandard specifications for public-key cryptography. http://www.cosc.georgetown.edu/~denning/crypto/ | |
|
53. SECRYPT 2008 - International Conference On Security And Cryptography International Conference on Security, cryptography, Main Topic Areas Access Control and Intrusion Detection, Network Security and Protocols, Cryptographic http://www.secrypt.org/ | |
|
54. Cryptography's Role In Securing The Information Society 1 GROWING VULNERABILITY IN THE INFORMATION AGE 2 cryptography ROLES, MARKET, AND INFRASTRUCTURE 3 NEEDS FOR ACCESS TO ENCRYPTED INFORMATION http://www.nap.edu/readingroom/books/crisis/ | |
|
55. Cryptography : City In The Sky Implementations by Dave Barton of many of the most useful symmetric encryption algorithms (Blowfish, Twofish, IDEA, Rijndael, and Serpent) and message http://www.cityinthesky.co.uk/cryptography.html | |
|
56. Web Pages Of Interest To Cryptography Researchers This page started out as a list of cryptography researchers home pages, but has been expanded to include links to things that are of interest to people http://www.swcp.com/~mccurley/cryptographers/cryptographers.html | |
|
57. Quantum Information Science And Technology Roadmapping Project The purpose of the quantum cryptography roadmap is to help facilitate the progress Please email comments on the quantum cryptography roadmap to Richard http://qist.lanl.gov/qcrypt_map.shtml | |
|
58. Python Cryptography Toolkit A collection of cryptographic algorithms and protocols, implemented for use from Python. http://www.amk.ca/python/code/crypto | |
|
59. Cryptography - A CompInfo Directory Find the best sources of Internetbased information on cryptography. http://www.compinfo-center.com/syssec/cryptography.htm | |
|
60. Applied Cryptography And Network Security (ACNS) 2008 The 6th International Conference on Applied cryptography and Network Security will bring together industry and academic researchers interested in the http://acns2008.cs.columbia.edu/ | |
|
Page 3 41-60 of 69 Back | 1 | 2 | 3 | 4 | Next 20 |