[ advisories | exploits | discussions | news | conventions | security tools | texts & papers ]
 main menu
- feedback
- advertising
- privacy
- FightAIDS
- newsletter
- news
 
 discussions
- read forum
- new topic
- search
 

 meetings
- meetings list
- recent additions
- add your info
 
 top 100 sites
- visit top sites
- sign up now
- members
 
 webmasters

- add your url
- add domain
- search box
- link to us

 
 projects
- our projects
- free email
 
 m4d network
- security software
- secureroot
- m4d.com

Home > Encryption, cryptography & privacy

Categories:

  • [Companies] (9) - Companies (cryptography & security)
  • [DES] (7) - DES cracking challenge
  • [Email Providers] (8) - Encrypted Email Providers
  • [Encryption policy] (7) - Encryption policy resources
  • [PGP] (6) - Pretty Good Privacy
  • [Steganography] (3) - Steganography simply takes one piece of information and hides it within another
  • [Tools] (24) - New Encryption tools

Links:

-=Triade systems=-
Triade systems - homepage: FREE Pascal/Delphi libraries, to handle huge integers (GInt), public key algorithms, key exchange algorithms. Also added papers about Number Field Sieve
http://ace.Ulyssis.Student.KULeuven.ac.be/~triade/index.html (2kb)


COSIC - COmputer Security and Industrial Cryptography
The goal of COSIC's research activities is to create an electronic equivalent for primitives in the physical world such as confidentiality, signatures, identification, anonymity, notarization, and payments.
http://www.esat.kuleuven.ac.be/cosic/ (19kb)


Cryptography
Resources for cryptography, including presentation, guidebook, FAQ, and a source code library. From one of the sponsors of this site
http://www.cryptography-tutorial.com (19kb)


Cryptography World
Cryptography for beginners - an explanation of the basic concepts and ideas.
http://www.cryptographyworld.com (11kb)


Crypto Law Survey
The Crypto Controversy. A Key Conflict in the Information Society
http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm (16kb)


Cryptography - An Overview
Introduction, algorithms, standards....
http://www.hack.gr/users/dij/crypto/ (2kb)


Data Encryption Techniques
Data Encryption Techniques
http://www.catalog.com/sft/encrypt.html (25kb)


EFF "Privacy, Security, Crypto, & Surveillance" Archive
EFF "Privacy, Security, Crypto, & Surveillance" Archive
http://www.eff.org/pub/Privacy/ (19kb)


Encryption Resources
Encryption software, information, issues, faqs, and white papers.
http://netsecurity.miningco.com/msub.htm (65kb)


Encryption[sic]
Encryption[sic] Featured Resource
http://www.neverness.net/crypto/index.html (13kb)


Index of /f-secure
These pages contain information on the strong encryption, cryptography and data security capabilities of the F-Secure product family.
http://www.datafellows.com/f-secure/ (1kb)


Keith Lockstone's home page
Codebook online, ciphers, analysis.
http://www.cix.co.uk/~klockstone/ (9kb)


ReplayTV
Website related to cryptography and computer security.
http://www.replay.com/ (10kb)


Ritter's Crypto Glossary and Dictionary of Technical Cryptography
Ritter's Crypto Glossary and Dictionary of Technical Cryptography
http://www.io.com/~ritter/GLOSSARY.HTM (377kb)


Survey: corporate uses of cryptography
How electronic encryption works and how it will change your business
http://www.viacorp.com/crypto.html (132kb)


The Applied Cryptography Case
The Applied Cryptography Case: Only Americans Can Type!
http://people.qualcomm.com/karn/export/ (6kb)


Untitled
Secure Explorer V1.1 Locks Windows Folders And Encrypts Data With Password Protection
http://freespace.virgin.net/cjpsoftware.cjp/ (55kb)


Untitled
Cryptology Lessons
http://www.achiever.com/freehmpg/cryptology/cryptofr.html (1kb)


Untitled
Crack This!!
http://glen.bridgland.itgo.com/crypt.htm (22kb)



17 resource(s) in this category...






(C) 1999-2000 All rights reserved.