[ advisories | exploits | discussions | news | conventions | security tools | texts & papers ]
 main menu
- feedback
- advertising
- privacy
- FightAIDS
- newsletter
- news
- read forum
- new topic
- search

- meetings list
- recent additions
- add your info
 top 100 sites
- visit top sites
- sign up now
- members

- add your url
- add domain
- search box
- link to us

- our projects
- free email
 m4d network
- security software
- secureroot
- m4d.com

Home > Encryption, cryptography & privacy


  • [Companies] (9) - Companies (cryptography & security)
  • [DES] (7) - DES cracking challenge
  • [Email Providers] (8) - Encrypted Email Providers
  • [Encryption policy] (7) - Encryption policy resources
  • [PGP] (6) - Pretty Good Privacy
  • [Steganography] (3) - Steganography simply takes one piece of information and hides it within another
  • [Tools] (24) - New Encryption tools


-=Triade systems=-
Triade systems - homepage: FREE Pascal/Delphi libraries, to handle huge integers (GInt), public key algorithms, key exchange algorithms. Also added papers about Number Field Sieve
http://ace.Ulyssis.Student.KULeuven.ac.be/~triade/index.html (2kb)

COSIC - COmputer Security and Industrial Cryptography
The goal of COSIC's research activities is to create an electronic equivalent for primitives in the physical world such as confidentiality, signatures, identification, anonymity, notarization, and payments.
http://www.esat.kuleuven.ac.be/cosic/ (19kb)

Resources for cryptography, including presentation, guidebook, FAQ, and a source code library. From one of the sponsors of this site
http://www.cryptography-tutorial.com (19kb)

Cryptography World
Cryptography for beginners - an explanation of the basic concepts and ideas.
http://www.cryptographyworld.com (11kb)

Crypto Law Survey
The Crypto Controversy. A Key Conflict in the Information Society
http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm (16kb)

Cryptography - An Overview
Introduction, algorithms, standards....
http://www.hack.gr/users/dij/crypto/ (2kb)

Data Encryption Techniques
Data Encryption Techniques
http://www.catalog.com/sft/encrypt.html (25kb)

EFF "Privacy, Security, Crypto, & Surveillance" Archive
EFF "Privacy, Security, Crypto, & Surveillance" Archive
http://www.eff.org/pub/Privacy/ (19kb)

Encryption Resources
Encryption software, information, issues, faqs, and white papers.
http://netsecurity.miningco.com/msub.htm (65kb)

Encryption[sic] Featured Resource
http://www.neverness.net/crypto/index.html (13kb)

Index of /f-secure
These pages contain information on the strong encryption, cryptography and data security capabilities of the F-Secure product family.
http://www.datafellows.com/f-secure/ (1kb)

Keith Lockstone's home page
Codebook online, ciphers, analysis.
http://www.cix.co.uk/~klockstone/ (9kb)

Website related to cryptography and computer security.
http://www.replay.com/ (10kb)

Ritter's Crypto Glossary and Dictionary of Technical Cryptography
Ritter's Crypto Glossary and Dictionary of Technical Cryptography
http://www.io.com/~ritter/GLOSSARY.HTM (377kb)

Survey: corporate uses of cryptography
How electronic encryption works and how it will change your business
http://www.viacorp.com/crypto.html (132kb)

The Applied Cryptography Case
The Applied Cryptography Case: Only Americans Can Type!
http://people.qualcomm.com/karn/export/ (6kb)

Secure Explorer V1.1 Locks Windows Folders And Encrypts Data With Password Protection
http://freespace.virgin.net/cjpsoftware.cjp/ (55kb)

Cryptology Lessons
http://www.achiever.com/freehmpg/cryptology/cryptofr.html (1kb)

Crack This!!
http://glen.bridgland.itgo.com/crypt.htm (22kb)

17 resource(s) in this category...

(C) 1999-2000 All rights reserved.