« earlier | later » Page 3 of 5
The Keccak sponge function family edit / delete
The hash function that's just won the SHA-3 contest. Excellent documentation, including a guide to implementing it that makes very interesting reading.
to cryptography hash sha3 ... on 15 October 2012
Block-layer Encryption edit / delete
Worryingly comprehensive. I just wanted to know how to use cryptsetup!
to cryptography dm dmcrypt ... on 16 September 2012
VCRPlus Controller Code Algorithm Explained edit / delete
to cryptography tv vcr vcrplus videoplus ... on 03 May 2012
Frode Weierud's CryptoCellar edit / delete
Interesting WW2 stuff.
to bletchley cryptanalysis cryptography history turing ... on 22 April 2012
Bitcoin P2P Cryptocurrency | Bitcoin edit / delete
Someone seems to have made a hashcash-like scheme that actually works -- notably, it has a limited amount of money overall. Neat.
to cryptography money ... on 23 October 2010
The Rutherford Journal - Colossus: Breaking the German 'Tunny' Code edit / delete
Good overview.
to colossus cryptography history retrotech turing ww2 ... on 13 September 2010
More interesting for the links in their FAQ than for the service itself, although a NetworkManager plugin that uses this would be an obvious application.
to cryptography network security wireless wpa ... on 17 August 2010
dm-crypt wiki : LUKS edit / delete
Setting up encrypted filesystems with dm-crypt -- very straightforward these days! I need to do this on sinclair at some point.
to cryptography dm filesystem software ... on 25 August 2009
Cryptographie militaire edit / delete
Kerckhoffs' well-known 1883 paper on military cryptography.
to cryptography history ... on 02 May 2009
staple / unstaple edit / delete
"staple is a program that inseparably binds together the data in a file using a cryptographic mechanism known as an All-or-nothing transform." With some interesting uses for it.
to cryptography software ... on 26 March 2009
« earlier | later » Page 3 of 5
tasty by Adam Sampson.