« earlier | later » Page 4 of 5
The SHA-3 Zoo - The ECRYPT Hash Function Website
Submissions to the NIST hash function competition, and attacks on them.
to cryptography hash maths ... on 16 November 2008
Distributed project to break as-yet undecrypted WW2 Enigma messages. Interesting application of distributed computing to the field of history rather than biology or chemistry.
to cryptography distributed enigma ... on 08 June 2008
Frode Weierud's CryptoCellar | Breaking German Wehrmacht Ciphers
Some more Enigma stuff.
to cryptography enigma ... on 08 June 2008
The best description of the Enigma-breaking process I've seen.
to cryptography enigma retrotech ... on 08 June 2008
Lots of detail about and period documents from Bletchley Park.
to cryptography retrotech ... on 29 April 2007
Voynich Manuscript Mailing List
With links to other stuff about the same thing.
to cryptography history ... on 17 November 2006
Some cool stuff on untangling historical cryptograms.
to cryptography history ... on 15 November 2006
Security Engineering - A Guide to Building Dependable Distributed Systems
Ross Anderson's book.
to cryptography ebooks security ... on 01 September 2006
to amusements cryptography obfuscated ... on 13 August 2006
The story of Alice and Bob; one form of the bit of text that shows up all over the place.
to amusements cryptography ... on 13 August 2006
« earlier | later » Page 4 of 5
- cryptography | |
2 | amusements |
1 | bcrypt |
1 | bletchley |
1 | books |
1 | bugs |
1 | c++ |
1 | ca |
1 | camera |
1 | ccc |
1 | certificate |
1 | code |
1 | colossus |
1 | coop |
2 | cryptanalysis |
1 | cryptogram |
48 | cryptography |
1 | dh |
1 | distributed |
2 | dm |
1 | dmcrypt |
1 | dsa |
1 | ebooks |
1 | efficiency |
2 | encryption |
7 | enigma |
1 | etext |
1 | filesystem |
1 | formal-methods |
1 | garstow |
4 | gpg |
2 | hash |
11 | history |
1 | http |
1 | journalism |
1 | key |
2 | library |
1 | manycore |
1 | maths |
1 | mechanica |
1 | metaphors |
1 | money |
2 | nacl |
1 | network |
1 | noise |
1 | obfuscated |
1 | packaging |
1 | papers |
1 | parallel |
1 | patterns |
1 | performance |
3 | pgp |
1 | photography |
1 | power |
1 | prime |
2 | programming |
1 | puzzle |
2 | python |
1 | random |
3 | retrotech |
2 | reverse-engineering |
1 | review |
1 | rng |
1 | rsa |
1 | safety |
1 | schneier |
12 | security |
1 | sha3 |
1 | signature |
4 | software |
1 | ssh |
5 | ssl |
1 | teaching |
1 | testing |
5 | tls |
1 | tor |
2 | turing |
1 | tv |
1 | update |
1 | vcr |
1 | vcrplus |
1 | verification |
1 | videoplus |
1 | web |
1 | whistleblowing |
1 | wireless |
1 | wpa |
6 | ww2 |
1 | xbox |
tasty by Adam Sampson.