cryptography
CompInfo - The Computer Information Center
The top one-stop reference resource for corporate IT, computers and communications
Millions of IT users world-wide rely on our Web-based support resources
Tell your colleagues and friends, and bookmark us at http://www.compinfo-center.com/
Computer
Magazines
Computer
Books
Computer
Events
CompInfo I.T.
Directories
Site
Search
Highlight
Your Company
Downloads, Drivers
and Reviews
Computer
News
Keep Informed -
Add Your Interests
MCSE Certification
Resources
IT Study
Resources

Cryptography - Outline
Topic Outline - KnowledgeBases - Newsgroups and FAQs - Magazines and Ezines - White Papers - Organizations and User Groups - News - Events - Related Topics - Books - Key Manufacturers - Where to Buy - Key Solutions Providers - Where to get Help - Key Service Providers - Key Training Providers
 
Cryptography - Knowledge Bases
  • Crypto Link Farm (David Harris)
    • Packed with links to cryptography and security sites
  • Cryptography A-2-Z (SSH Communications Security)
    • This page lists international sources of cryptographic software, information on cryptographic methods, algorithms, and protocols. The scope includes encryption, decryption, cryptanalysis, steganography (hiding information), cryptographic softare, tools, information, and assessments about cryptographic methods.
  • Crytography Links (Bruce Schneier)
    • An extensive collection of links, created and maintained by Counterpane Systems
  • Digital Cryptography and Encryption Resources (CyPost Corp)
    • This site includes links to digital cryptography, privacy and encryption related websites on the Internet
  • International Association for Cryptologic Research
    • The International Association for Cryptologic Research (IACR) is a non-profit scientific organization whose primary purpose is to further research in cryptology and related fields.
  • OpenSSL: The Open Source toolkit for SSL/TLS
    • "The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL toolkit and its related documentation."
  • The Standards for Efficient Cryptography Group (SECG)
  • Theory of Cryptography Library (UCSD)
    • The library is intended to store works of interest to researchers interested in the theoretical aspects of Cryptography
  • The World-Wide Web Virtual Library: Cryptography, PGP, and Your Privacy (Francis Litterio)
    • There are two kinds of cryptosystems: symmetric and asymmetric. Symmetric cryptosystems use the same key (the secret key) to encrypt and decrypt a message, while asymmetric cryptosystems use one key (the public key) to encrypt a message and a different key (the private key) to decrypt it. Assymetric cryptosystems are also called public key cryptosystems.
  • SEE also Related Topics
..........Back to Top
 
Cryptography - Newsgroups and FAQs
..........Back to Top
 
Cryptography - Magazines and Ezines
..........Back to Top
 
Cryptography - White Papers
..........Back to Top
 
Cryptography - Organizations and User Groups
..........Back to Top
 
Cryptography - News
..........Back to Top
 
Cryptography - Events
..........Back to Top
 
Cryptography - Related Topics
Anti-Virus Software - Asset Tracking & Recovery - Back-up - Biometrics - Cryptography - Data Recovery - Data Protection - E-mail content security software - Encryption - Firewalls - Hackers and Anti-Hacking - Identity Verification - Information Warfare - Internet Security - Intrusion Detection - Network Security - PGP - Public Key Infrastructure (PKI) - Systems and Computer Security - Technical Surveillance Countermeasures - Virtual Private Network (VPN) - WebSite Security
..........Back to Top
 
Cryptography - Books
..........Back to Top
 
Cryptography - Key Manufacturers
If your company offers Products applicable to this Topic, and you wish to reach the hundreds of thousands of IT users who benefit from these pages each month, please contact us
..........Back to Top
 
Cryptography - Key Solutions Providers
If your company offers Products and/or Services applicable to this Topic, and you wish to reach the hundreds of thousands of IT users who benefit from these pages each month, please contact us
..........Back to Top
 
Cryptography - Key Service Providers
If your company offers Services applicable to this Topic, and you wish to reach the hundreds of thousands of IT users who benefit from these pages each month, please contact us
..........Back to Top
 
Cryptography - Key Training Providers
If your company offers Training Services applicable to this Topic, and you wish to reach the hundreds of thousands of IT users who benefit from these pages each month, please contact us
..........Back to Top
 

©Copyright The Computer Information Center 1995 - 2002
Disclaimer

The Computer Information Center provides information in good faith, but does not provide any warranties whatsoever, nor assume any legal liability or responsibility whatsoever, for the accuracy, completeness or usefulness of any of the information supplied. It is not in any way responsible, and has no legal liability, in respect of the contents of any other site referenced from this site, nor for information provided through that site. The ownership of all trademarks, etc. referred to on this site is acknowledged