Keylength - Cryptographic Key Length Recommendation
Easily find the minimum cryptographic key length recommended by different scientific reports and governments.
Sprache: Englisch
Homepage of Thomas Pöppelmann
The Hardware Security SDK is the best framework for using security keys and smart cards on mobile devices. Our SDK extends your app with hardware security support to allow SSH authentication, TLS client certificate authentication or SQLCipher encryption. We secure successful projects for businesses across the globe.
Mit zielgenauem Einsatz und einfacher Verwaltung von PKI, KMS und HSM wird der komplette kryptografische Key Management Lifecycle effektiv abgedeckt.
From 2015 to 2019, Joost Rijneveld was a PhD candidate at Radboud University, Nijmegen, working on software implementations of post-quantum cryptography (as part of the PQCRYPTO project).
Within the next months I want to connect a remote location to the internet which only has a power connection but no telephone access whatsoever. I already thought about buying some ready-made LTE router when I learned that OpenWRT supports tethered LTE network access via iPhones. Read more »
Start analyzing encrypted data today with Secret Computing® technology by Inpher, the company pioneering privacy preserving machine learning.
Thom Wiggers, PhD candidate at Radboud University
Friendly Captcha defends your websites and online services from spam and abuse. It is Schrems II and GDPR compliant & protects user privacy.
Mark Manulis Homepage
Website of Gildas Avoine
Centre for Applied Cryptographic Research at the University of Waterloo
The Cryptography Management Kit is designed to help you progress with cryptography as efficently as possible.
Simon KRAMER's homepage at SK-R&D Ltd liab. Co
Security expertise for hire. Technology consulting. Application security above and beyond compliance. PHP security. Applied cryptography. Secure-by-default web application development. Encryption, digital signatures, authentication protocols, and more.
With over 35 years of experience in applied cryptography, Certicom provides PKI and key management solutions to help secure the automotive, semiconductors and IoT industry.
Security Architect
Die neue Solutions SA 2015
DI Management Home Page
The National Security Agency/Central Security Service leads the U.S. Government in cryptology that encompasses both signals intelligence insights and cybersecurity products and services that enables computer network operations to gain a decisive advantage for the nation and our allies.
Ko Stoffelen
Landon Curt Noll's isthe.com home site
Joern Schweisgut - Homepage
Password recovery and password crack software: for archives (ZIP, RAR, ARJ, ACE), Microsoft Office (Word, Excel, Access, Outlook), Lotus SmartSuite (WordPro, 1-2-3, Approach, Organizer), Adobe Acrobat PDF, Windows NT XP Vista 2003 2000 7, Intuit Qicken & QickBooks, WiFi networks, Microsoft SQL servers, iPhone, iPod Touch, Apple, ATI, SQL Server, iPad, BlackBerry, Firefox, Safari, Opera, Chrome.