C-Q-RI-T (Security)
POWERED BY
DESIGN WITH AN ATTITUDE!
HUMANS!
Go to the Communication Dot Org Main Page
C-Q-RI-T (Security)

Cryptography

Algorithmic Research
ASCOM Systec Homepage
A-Z Cryptology
Beginners Cryptography Page
BIG crypto code archive
Bovine RC5 Cracking Project
Carrick, an encryption toolkit
Center for Cryptography, Computer, and Network Security
Certicom
Certification Infrastructure Needs For Electronic Commerce And Personal Use
Coded Drag
Cold War Codebreaking
Conferences on Security and Cryptography
Counterpage Systems, Computer Security and Cryptography Consulting
Crack
Crypt Newsletter
Cryptanalysis Papers and Tools from Oxford
CryptDisk software for the Mac
Security and Encryption Ressources
Crypto Shareware and Freeware
Crypto++ 2.0 - a C++ Class Library of Cryptographic Primitives
Cryptography archive at ftp.funet.fi
Cryptography Theory and Practice
CRYPTOGRAPHY.COM
Cryptography_ The Study of Encryption
Cryptography's Role in Securing the Information Society
Cryptologia
Cygnacom Solutions
Cypherpunks' Homepage
Cypris Encryption Processor
Data Encryption Standard Challenge
Data Encryption Techniques
Decentralized Trust Management
Delegation and Agreement Based Certification Policy
DES crack page
Diffie-Hellman Method For Key Agreement
Encryption detour discovered
envelope
Evaluation Criteria for Cryptography
FIPS, Government Encryption Standards
Flaw in Cell Phone Encryption Identified
Fortezza Encryption Card
International Association of Cryptologic Research (IACR)
International Cryptographic Software Pages for Encryption, Decryption, Cryptanalysis, Steganogr
Internet Privacy Coalition
Internet Software Solutions
Lawrie Brown's crypto bibliography
Limitations of the Kerberos Authentication System
Meganet Virtual Matrix Encryption
Message Authentication Research, alternative to MD5
Mitsubishi Electric Corp Data Encryption Algorithm MISTY
nCipher Corporation
New Crypto Technique from NEC
Newbies guide to cryptography
Pretty Good Privacy (PGP) Installation - Step by Step
Protocol Failure in the Escrowed Encryption Standard
Public-Key Cryptography Standards
Quadralay Cryptology Archive
RC5-56 Project
Ronald L. Rivest's Cryptography and Security
Ross Anderson's homepage
RPEM
RPK Public Key Cryptography
RSA Cryptography FAQ
RSA's Frequently Asked Questions
RSA's S_MIME Central
Security and Encryption Ressources
SEMS
Sesame
Simple Public Key Certificate
SkeyCalc - A NEXTSTEP S_Key Response Calculator
SKIP - Simple Key management for Internet Protocols
Slammin' Tech Inc.
Steganography
TEA, a Tiny Encryption Algorithm.
Teledyne Security Information
The Colossus Rebuild Project
The Cryptography Project
The hash function RIPEMD-160
The Tiny Cryptography Contest Homepage
Time-lock puzzles and timed-release Crypto
Towards A European Framework for Digital Signatures And Encryption
Welcome to CRYPTOGRAPHY.COM
Why Cryptography is Harder than it Looks
Extreme Tracking C-Q-RI-T (Security)