BibSonomy bookmarks for /tag/cryptography%20=Ohttps://www.bibsonomy.org/tag/cryptography%20=OBibSonomy RSS Feed for /tag/cryptography%20=OAn Illustrated Guide to Cryptographic Hashesthe recent news of weaknesses in some common security algorithms (MD4, MD5, SHA-0), many are wondering exactly what these things are...http://www.unixwiz.net/techtips/iguide-crypto-hashes.htmlpanic2011-10-01T02:27:28+02:00Cryptography Guide(s) Programming Algorithms =O <span itemprop="description">the recent news of weaknesses in some common security algorithms (MD4, MD5, SHA-0), many are wondering exactly what these things are...</span>Basic Cryptanalysisintroduction to cryptanalysis, substitution systems, etc... (U.S. Army)http://www.umich.edu/~umich/fm-34-40-2/panic2011-10-01T02:27:15+02:00Cryptography Algorithms Programming Book(s) eBook(s) Free 1990 =O <span itemprop="description">introduction to cryptanalysis, substitution systems, etc... (U.S. Army)</span>OpenSSLa collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptographyhttp://www.openssl.org/panic2011-10-01T02:27:10+02:00SSL Library Cryptography Algorithms Programming =O <span itemprop="description">a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography</span>TorAn anonymous Internet communication toolset communications are bounced around a distributed network of servers, called onion routers.http://tor.eff.org/panic2011-10-01T02:27:02+02:00GNU_Linux Network Security OpenSource Programming Win32 Windows Cryptography Distributed FileSharing P2P Proxy Protocol Cpp =O <span itemprop="description">An anonymous Internet communication toolset communications are bounced around a distributed network of servers, called onion routers.</span>NetCryptoa library of functions and a framework to interface with crypto algorithms provided by the calling application, built-in, or provided through shared libraries.http://www.netcrypto.org/panic2011-10-01T02:26:50+02:00C Cryptography Algorithms Programming Library OpenSource BSD_License =O <span itemprop="description">a library of functions and a framework to interface with crypto algorithms provided by the calling application, built-in, or provided through shared libraries.</span>John the Rippera fast password cracker, currently available for many flavors. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, many others supported out of the boxhttp://www.openwall.com/john/panic2011-10-01T02:26:42+02:00Cool Hack Cryptography Software Tool(s) Algorithms Programming OpenSource =O <span itemprop="description">a fast password cracker, currently available for many flavors. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, many others supported out of the box</span>An Overview of Cryptographyby Gary C. Kessler in May 1998 updated 3 June 2008http://www.garykessler.net/library/crypto.htmlpanic2011-10-01T02:26:08+02:00Cryptography Information Programming Math Security Algorithms Paper(s) 1998 Science_and_Technology Got =Reference =O <span itemprop="description">by Gary C. Kessler in May 1998 updated 3 June 2008</span>DRM is a complete lieDRM has absolutely nothing to do with protecting content, it is about protecting the wallets of major corporations.http://www.theinquirer.net/?article=29161panic2011-10-01T02:26:03+02:00Cryptography DRM Law Music Information Article(s) January 2006 =O <span itemprop="description">DRM has absolutely nothing to do with protecting content, it is about protecting the wallets of major corporations.</span>binary translatorPlease note: This application encodes and decodes ASCII and ANSI text. Only codepoints < 128 are ASCII. This provided for educational and entertainment use only.http://www.paulschou.com/tools/xlate/panic2011-10-01T02:25:52+02:00Cryptography Encoding WEB Tool(s) Free =O <span itemprop="description">Please note: This application encodes and decodes ASCII and ANSI text. Only codepoints < 128 are ASCII. This provided for educational and entertainment use only.</span>Security EngineeringA Guide to Building Dependable Distributed Systemshttp://www.cl.cam.ac.uk/~rja14/book.htmlpanic2011-10-01T02:25:39+02:00Design Cryptography Distributed Network Programming Security eBook(s) Book(s) Free Information =O <span itemprop="description">A Guide to Building Dependable Distributed Systems</span>Permissive Action Links (PAL)A PAL -- a "Permissive Action Link" -- is the box that is supposed to prevent unauthorized use of a nuclear weapon. It's supposed to be impossible to "hot-wire" a nuclear weapon. Is it?http://www.cs.columbia.edu/~smb/nsam-160/pal.htmlpanic2011-10-01T02:25:05+02:00Cryptography Electronics Hardware Security History Culture Information =O <span itemprop="description">A PAL -- a "Permissive Action Link" -- is the box that is supposed to prevent unauthorized use of a nuclear weapon. It's supposed to be impossible to "hot-wire" a nuclear weapon. Is it?</span>