« earlier | later » Page 4 of 5
VCRPlus Controller Code Algorithm Explained
to cryptography tv vcr vcrplus videoplus ... on 03 May 2012
Interesting WW2 stuff.
to bletchley cryptanalysis cryptography history turing ... on 22 April 2012
Bitcoin P2P Cryptocurrency | Bitcoin
Someone seems to have made a hashcash-like scheme that actually works -- notably, it has a limited amount of money overall. Neat.
to cryptography money ... on 23 October 2010
The Rutherford Journal - Colossus: Breaking the German 'Tunny' Code
Good overview.
to colossus cryptography history retrotech turing ww2 ... on 13 September 2010
More interesting for the links in their FAQ than for the service itself, although a NetworkManager plugin that uses this would be an obvious application.
to cryptography network security wireless wpa ... on 17 August 2010
Setting up encrypted filesystems with dm-crypt -- very straightforward these days! I need to do this on sinclair at some point.
to cryptography dm filesystem software ... on 25 August 2009
Kerckhoffs' well-known 1883 paper on military cryptography.
to cryptography history ... on 02 May 2009
"staple is a program that inseparably binds together the data in a file using a cryptographic mechanism known as an All-or-nothing transform." With some interesting uses for it.
to cryptography software ... on 26 March 2009
The SHA-3 Zoo - The ECRYPT Hash Function Website
Submissions to the NIST hash function competition, and attacks on them.
to cryptography hash maths ... on 16 November 2008
Distributed project to break as-yet undecrypted WW2 Enigma messages. Interesting application of distributed computing to the field of history rather than biology or chemistry.
to cryptography distributed enigma ... on 08 June 2008
« earlier | later » Page 4 of 5
- cryptography | |
2 | amusements |
1 | bcrypt |
1 | bletchley |
1 | books |
1 | bugs |
1 | c++ |
1 | ca |
1 | camera |
1 | ccc |
1 | certificate |
1 | code |
1 | colossus |
1 | coop |
2 | cryptanalysis |
1 | cryptogram |
48 | cryptography |
1 | dh |
1 | distributed |
2 | dm |
1 | dmcrypt |
1 | dsa |
1 | ebooks |
1 | efficiency |
2 | encryption |
7 | enigma |
1 | etext |
1 | filesystem |
1 | formal-methods |
1 | garstow |
4 | gpg |
2 | hash |
11 | history |
1 | http |
1 | journalism |
1 | key |
2 | library |
1 | manycore |
1 | maths |
1 | mechanica |
1 | metaphors |
1 | money |
2 | nacl |
1 | network |
1 | noise |
1 | obfuscated |
1 | packaging |
1 | papers |
1 | parallel |
1 | patterns |
1 | performance |
3 | pgp |
1 | photography |
1 | power |
1 | prime |
2 | programming |
1 | puzzle |
2 | python |
1 | random |
3 | retrotech |
2 | reverse-engineering |
1 | review |
1 | rng |
1 | rsa |
1 | safety |
1 | schneier |
12 | security |
1 | sha3 |
1 | signature |
4 | software |
1 | ssh |
5 | ssl |
1 | teaching |
1 | testing |
5 | tls |
1 | tor |
2 | turing |
1 | tv |
1 | update |
1 | vcr |
1 | vcrplus |
1 | verification |
1 | videoplus |
1 | web |
1 | whistleblowing |
1 | wireless |
1 | wpa |
6 | ww2 |
1 | xbox |
tasty by Adam Sampson.