Mab's stuff: research papers talks bio Trust Management RFC-2704 RFC-2792 Risks Report photographs export notices Crypto.Com, Inc. Carnivore testimony Risks of Carnivore Comments on IITRI report FC '02 CFP Other links: Halfbakery Ron Rivest Crypto Bibliography AT&T Research CDT Crypto Policy EFF EPIC Welcome to crypto.com, Matt Blaze's cryptography resource on the Web New Stuff: December 26, ...
Ross Anderson What's New The Campaign for Cambridge Science seeks to overturn a decision by the University authorities that from the beginning of 2003, most of the intellectual property generated by faculty members - from patents on bright ideas to books written up from lecture notes - will belong to the university rather than to the faculty member who created them. At a stroke, Cambridge will ...
www.cl.cam.ac.uk/users/rja14
Ronald L. Rivest Professor Rivest is the Andrew and Erna Viterbi Professor of Electrical Engineering and Computer Science in MIT's Department of Electrical Engineering and Computer Science. He is a member of MIT's Laboratory for Computer Science, a member of the lab's Theory of Computation Group and a founder of its Cryptography and Information Security Group. He is also a founder of RSA Data ...
theory.lcs.mit.edu/~rivest
Free C++ library for cryptography: includes ciphers, message authentication codes, one-way hash functions, public-key cryptosystems, key agreement schemes, and deflate compression ...
www.eskimo.com/~weidai/cryptlib.html
Strong cryptographic software, libraries, and information about cryptography, data security, and privacy.
MD5: Introduction MD5 was developed by Professor Ronald L. Rivest of MIT. What it does, to quote the executive summary of rfc1321, is: takes as input a message of arbitrary length and produces as output a 128-bit fingerprint or message digest of the input. It is conjectured that it is computationally infeasible to produce two messages having the same message digest, or to produce any message ...
userpages.umbc.edu/%7emabzug1/cs/md5/md5.html
Home Publications Courses Students Links Calendar Educational CV & Research Summary Cryptography Group Internal: Access Restricted Welcome to Mihir Bellare's web page. I am a Professor in the Department of Computer Science and Engineering at the University of California, San Diego. Mailing Address: Department of Computer Science & Engineering University of California at San Diego 9500 Gilman ...
www-cse.ucsd.edu/users/mihir
Centre for Applied Cryptographic Research at the University of Waterloo ...
www.cacr.math.uwaterloo.ca
David Wagner Assistant Professor Computer Science Division University of California, Berkeley Research interests. Computer security, especially security of large-scale systems and networks. Applications of static and dynamic program analysis to computer security. Theory of cryptography. Design and analysis of symmetric-key cryptosystems. Operating systems. Theory. I am currently working on ...
Phillip Rogaway I am a Professor in the Dept of Computer Science at UC Davis. I am also a regular visitor to the Dept of Computer Science at Chiang Mai University. And just in case two homes is still not enough, I'll soon spend a term at the Dept of Computer Engineering at Chulalongkorn University. My research is in cryptography. I did my undergraduate work at UC Berkeley, and completed my Ph.D.
www.cs.ucdavis.edu/~rogaway
Eli Biham's Home Page Research Information Research areas: cryptography and cryptanalysis, differential and linear cryptanalysis, quantum cryptography and quantum computation. Publications Tiger - a Fast New Cryptographic Hash Function Serpent - A New Block Cipher Proposal for AES The Nessie project - New European Schemes for Signatues, Integrity, and Encryption I am a director of the ...
www.cs.technion.ac.il/~biham
Victor Shoup's Home Page victor@shoup.net Current address: Courant Institute 251 Mercer Street New York, NY 10012 Tel: +1 (212) 998-3511 shoup@cs.nyu.edu NTL: A Library for doing Number Theory (version 5.3) NTL is a high-performance, portable C++ library providing data structures and algorithms for manipulating signed, arbitrary length integers, and for vectors, matrices, and polynomials over ...
Ciphergoth.org Paul Crowley's home page. Mostly cryptology and pictures of goths, appropriately enough. About me Technical interests, Sexuality, CV... Cryptology results against Schneier's Solitaire, papers on LEVIATHAN and Mercy... Photography Whitby Gothic Weekends, Tokyo goths... Software Gallerific photo gallery generator, Lego line follower... Writing There are no rules to Mornington ...
Cryptography and Encryption Security & Related Books Security & Privacy Resources Steganography & Digital Watermarking Cryptography & Encryption The Codebreakers Research in Cryptography Related Systems Issues Red Tape & White Flags Documents, News & Publications Security Newsgroups Security Tools & Archives Organizations in Security & Privacy Selected Bibliographies Other Security Links Amazon ...
www.jjtc.com/Security/crypto.htm
Mcrypt file encryption program for unix, and libmcrypt a crypto library.
mcrypt.hellug.gr/#_libmcrypt
Bifroest Mr. Tines CTC Home CTClib MacCTC CTCjava Manual CTC Freeworld Crypto Freeware CTC is a collection freeware PGP-interoperable encryption software package developed by Ian Miller and Mr. Tines. CTC does not stand for anything; it is Rot13( PGP ). The currently released components are:- CTClib a ANSI-C library by both authors. Current release: 2.2 Released 28-Oct-1999 Release Notes MacCTC ...
www.bifroest.demon.co.uk/ctc
Welcome to Matt Curtin: The Web Page. You've reached my virtual presence. If you feel so inclined, let me know what you think. Spector Professional Review and Commentary If you're using spyware to see what your children or employees are doing, you might well be allowing a vendor to spy on them as well. We performed a quick analysis of Spector Pro for Windows for WBNS-10TV in Columbus, and ...
www.interhack.net/people/cmcurtin
Lars Ramkilde Knudsen Advanced Encryption Standard Me, myself, I Cryptology Publications Serpent Miscellaneous Links Press Latest: I have moved to Denmark and am employed here. Eurocrypt'2002 . Proceedings from FSE'6, Lecture Notes in Computer Science vol. 1636 are now available online. (NOTE that you need Springer's LINK access in order to get to these.) NESSIE - a European sea Serpent.
Workshop on Cryptographic Hardware and Embedded Systems 2002 (CHES 2002) Hotel Sofitel, San Francisco Bay (Redwood City), USA August 13 - 15, 2002 Preliminary Program PROGRAM PROGRAM (TXT) ACCEPTED PAPERS ACCEPTED PAPERS (TXT) REGISTRATION FORM (PDF) REGISTRATION FORM (TXT) LOCATION ACCOMMODATIONS DIRECTIONS CALL FOR PARTICIPATION (PDF) CALL FOR PARTICIPATION (PS) CALL FOR PARTICIPATION (TXT) ...
islab.oregonstate.edu/ches
Ueli Maurer Home page Publications Some talks Contact Short CV Group page Home page Ueli Maurer Professor of Computer Science Head of the Information Security and Cryptography Research Group mail: maurer@inf.etz.c url: http://www.crypto.ethz.ch/~maurer/ phone: +41 1 632 74 20 secretary: +41 1 632 73 85 fax: +41 1 632 11 72 Postal address: Department of Computer Science ETH Zurich CH - 8092 ...
www.crypto.ethz.ch/~maurer
Joseph H. Silverman Office: 214 Kassar House Phone: (401) 863-1132 Fax: (401) 863-9013 Email: jhs@math.brown.edu Email: joseph_silverman@brown.edu Mailing Address: Mathematics Department Box 1917 Brown University Providence, RI 02912 USA Teaching Schedule: Academic 2002/2003 Fall - Math 156 - Number Theory Research Interests: Number theory, elliptic curves, arithmetic and Diophantine geometry, ...
Startseite Lehrstuhl Prof.Dr. Schnorr, J.W.Goethe-Universitaet Frankfurt ...
www.mi.informatik.uni-frankfurt.de/index.html
Xceed Encryption Library (ActiveX, .NET and COM component) - Xceed Software provides a comprehensive suite of software component products designed to greatly simplify the task of adding specific capabilities to Windows or web applications ...
www.xceedsoft.com/products/Encrypt
CRYPTO 2002 August 18-22, 2002 Santa Barbara, California, USA Main Call For Papers Local Information Registration Accepted Papers Preliminary Program Rump Session Contact sponsored by The 22nd Annual International Cryptology Conference Crypto 2002 is the 22nd international conference on cryptology held at the University of California, Santa Barbara. The academic program covers all aspects of ...
www.iacr.org/conferences/crypto2002
Eurocrypt 2002 index page ...
Paul Syverson Home Page I am employed at the Center for High Assurance Computer Systems (CHACS) of the Naval Research Laboratory (NRL) in Washington D.C., USA. Contact Information A picture of me Google 'Cause I use it all the time. Some advertisements for professional activities with which I am involved: Program Chair, 2002 Workshop on Privacy Enhancing Technologies (PETS) Guest Editor, Journal ...
We offer FREE downloads of our high-powered security program, Kremlin Encryption and Security Suite.
Search our site: Home: Company: Paul Kocher PROFILES Paul Kocher Benjamin Jun Joshua Jaffe Carter Laren Nate Lawson REQUEST INFO DIRECTIONS CAREERS Paul Kocher has gained an international reputation for his consulting work and academic research in cryptography. He brings unsurpassed expertise to the Cryptography Research team, having provided applied cryptographic solutions to clients ranging ...
www.cryptography.com/company/Paul-Kocher.html
Homepage of Stefan Lucks ...
th.informatik.uni-mannheim.de/People/Lucks
The IHW2001 home page is now hosted at http://www.cert.org/IHW2001 DISCLAIMER REGARDING LINKS TO OTHER WEB SERVERS ...
chacs.nrl.navy.mil/IHW2001
Cryptor is the software-only solution for the protection of data files within a FoxPro, Visual FoxPro, Visual Basic or C++ application.
www.hallogram.com/cryptor
RTF, HTML, convert, RTF-2-HTML, EasyByte, News, Resource, Filter, Enterprise, Information.
www.easybyte.com/products/cryptocx.html
Alfarez abdul rahman PhD candidate University College London supervisor Steve Hailes Director imetrix Ltd RESUME RESEARCH PHOTOGRAPHY email: farez@acm.org phone: +44 7939 610241 snail mail: Department of Computer Science, University College London, Gower Street, London wc1e 6bt ...
www.cs.ucl.ac.uk/staff/F.AbdulRahman
Botan (formerly OpenCL) is a C++ library of cryptographic primitives. It has been in development for about 4 years, and is finally in the last stretch for a stable 1.0 release. Go here to download the latest version, including source tarballs and (usually) binary RPMs for your favorite systems. Documentation of various forms include: The FAQ The license The ChangeLog Some benchmarks API docs: ...
cnscenter.future.co.kr/icisc01
Emacs Cryptographic Library and Tools Ecrypto2.0.tgz (29436 bytes) - an emacs crypto library. includes code for IDEA, Blowfish, SHA-1, MD5, RC16 (RC4 extension), an initial implementation of DES, and a few related toys. (note: sometimes the caching on this server seems to go haywire. if you end up with fewer than 29436 bytes, please mail me and i'll kick it until it works again. or check at this ...
web.mit.edu/thouis/www/ecrypto.html
AMS Special Session on Cryptography and Computational and Algorithmic Number Theory Ohio State University, Columbus Ohio September 21-23, 2001 Pictures! Announcements Because of the recent tragic events in New York, Washington, and Pennsylvania, several of our confirmed speakers have had to cancel. The AMS has decided to go forward with the meetings, and so shall we: We plan to go ahead with the ...
euclid.butler.edu/~sorenson/ams.html
www.users.zetnet.co.uk/hopwood/crypto/scan
A detailed discussion of cryptographic Boolean function nonlinearity, what it means and how it is computed, with active JavaScript panels to perform the computation. A Ciphers By Ritter page.
www.ciphersbyritter.com/JAVASCRP/NONLMEAS.HTM
Steves Homepage with fast updates of D2Mac Seca, Irdeto and Viaccess channel codes, Hexfiles, Download section and Forum ...
Implementing Hidden Field Equations (HFE) in Java This project is an Java implementation of a public key cryptography system called Hidden Field Equations (HFE). It was part of my visiting year at University College Cork (Ireland) and was accepted for the Irish Signals and Systems Conference 2002. You can download the project documentation as PS or PDF file (430 kB each), the Java source code ...
www.christopher-wolf.de/hfe
ENIGMA 2.0 A Windows-based emulator of the 3 rotor service machine. Chances are you already know all about these fascinating machines otherwise it's unlikely you'd be visiting this site. I'm therefore going to save time (and web space) by not going into the history and details of the machine. There are so many excellent web pages already devoted to the subject I feel that I certainly have ...
www.users.globalnet.co.uk/~andlaw/engindex.htm
Sliderule Engineering offers ActiveX Encryption toolkits for Windows Developers. Algorithms supported include Blowfish, Rijndael, SHA-1, Diffie-Hellman.
KIAS Workshop on Mathematics of Public Key Cryptography June 25, 26 and 27, 2001 KIAS International Conference Hall Speakers J. Cheon (ICU) G. Choe (KAIST) G. Frey (U. Essen) S. Galbraith (U. Bristol) S. Hahn (KAIST) P. Nguyen (ENS/CNRS) T. Satoh (Saitama U.) R. Schoof (U. Rome) E. Verheul (Pricewaterhouse Coopers) H. Yu (KIAS) Organizers J. Cheon (ICU) Y. Choie (Postech) D. Kim (Korea U.) S.
newton.kias.re.kr/~hsyu/crypt.html
BoogaCrypt Encryption and Compression Programs, Algorithms, and Developer Resources ...
Visual C++ source code for the RSA MD5 Message Digest algorithm. Includes a test program with performance statistics. This implementation was developed by Langfine Ltd and placed in the public domain.
www.langfine.com/rsa_md5.htm
Snapshield provides point-to-multipoint security solutions that protect voice, fax and data communications from wiretapping and eavesdropping. Using revolutionary network-based encryption, Snapshield offers an easily implemented, highly effective solution for telecom security.
www.snapshield.com/Products_licensing_fs.html
Technology Pathways LLC- Security focused software tools and consulting ...
www.techpathways.com/DesktopDefault.aspx?tabindex=3&tabid=3