Forum: Security and Cryptography

Security and Cryptography forum discussing issues related to coding, server applications, network protection, data protection, firewalls, ciphers and the like.

Notices

Threads 121 to 150 of 2235
Page 5 of 75 First ... 345671555 ... Last

1. Security and Cryptography FAQs

• Posts: 0

Never

1. Sticky: Security and Cryptography Community FAQ

• Replies: 4
• Views: 8,527
May 16th, 2012, 05:04 AM
2. Sticky: Hashing Algorithms

• Replies: 36
• Views: 22,373
October 18th, 2009, 11:02 PM
3. Sticky: Cryptology Resources

• Replies: 4
• Views: 10,144
August 22nd, 2008, 07:47 AM
4. Sticky: READ: Security and Cryptography Forum Rules

• Replies: 0
• Views: 8,044
July 20th, 2006, 03:11 AM
5. Sticky: Cryptography Resources - Master List

• Replies: 0
• Views: 17,046
July 12th, 2006, 04:29 AM
1. Quick question about Rijndael/AES decrypt rounds

• Replies: 10
• Views: 774
March 17th, 2013, 10:49 PM
2. Non-Math Chaos/RNG

• Replies: 17
• Views: 1,091
March 15th, 2013, 09:46 PM
3. Iptables bash multiple nic's

• Replies: 0
• Views: 511
March 15th, 2013, 10:25 AM
4. Is this method for exchanging symmetric key using RSA sound?

• Replies: 1
• Views: 707
March 11th, 2013, 05:02 PM
5. KB15: A stream cipher with rolling keys.

• Replies: 7
• Views: 1,151
March 3rd, 2013, 03:45 PM
6. Encryotion algorithm for full documents

• Replies: 3
• Views: 794
March 3rd, 2013, 02:25 PM
7. Secret Sharing book

• Replies: 0
• Views: 537
March 3rd, 2013, 06:41 AM

• Replies: 8
• Views: 852
March 2nd, 2013, 04:54 PM
9. A simple method to simulate PKE

• Replies: 2
• Views: 614
March 1st, 2013, 05:38 PM
10. Numerical problem

• Replies: 7
• Views: 680
February 22nd, 2013, 01:36 PM
11. Numerical problem

• Replies: 0
• Views: 526
February 22nd, 2013, 11:19 AM

•
•

13. Blowfish Algorithm - C Implementation

• Replies: 5
• Views: 7,210
February 14th, 2013, 11:06 PM

•
•

15. [Evalutation and Question]Problem with my program.

• Replies: 4
• Views: 628
February 9th, 2013, 09:18 AM
16. RSA Algorithm

• Replies: 1
• Views: 607
February 7th, 2013, 02:49 PM
17. Decrypting .cfg of a Well T-22P IP phone

• Replies: 2
• Views: 687
February 6th, 2013, 05:57 PM

• Replies: 0
• Views: 511
February 5th, 2013, 07:01 AM
19. Deriving the IV from the plaintext hash

• Replies: 0
• Views: 525
February 2nd, 2013, 09:52 AM
20. Implemtation bugs

• Replies: 0
• Views: 457
February 2nd, 2013, 06:35 AM
21. Some starting material to test encryption tool

• Replies: 2
• Views: 546
January 31st, 2013, 01:18 PM
22. Algorithm for PSK used in wpa2????

• Replies: 0
• Views: 666
January 30th, 2013, 05:36 AM
23. Barcode Encryption of Identifiers: is it possible?

• Replies: 2
• Views: 1,977
January 29th, 2013, 08:46 PM
24. .htaccess code to password protect 1 file

• Replies: 5
• Views: 53,652
January 28th, 2013, 10:51 PM

• Replies: 3
• Views: 1,084
January 21st, 2013, 09:08 AM
26. Is this SHA256?

• Replies: 2
• Views: 718
January 9th, 2013, 04:20 AM
27. Find the result of third number

• Replies: 1
• Views: 637
January 5th, 2013, 07:36 PM
28. Xor Encryption

• Replies: 4
• Views: 917
January 4th, 2013, 07:51 AM
29. SSL on multiple sites?

• Replies: 2
• Views: 542
January 3rd, 2013, 04:28 AM
30. Win 2008 - CF9

• Replies: 0
• Views: 714
December 28th, 2012, 09:06 AM

Forum Information and Options 

Users Browsing this Forum

There are currently 5 users browsing this forum. (0 members & 5 guests)