Encryption
From Just Solve the File Format Problem
(Difference between revisions)
Dan Tobias (Talk | contribs) (→External links) |
Dan Tobias (Talk | contribs) (→External links) |
||
Line 43: | Line 43: | ||
* [http://boingboing.net/2013/09/05/report-nsa-slices-through-mos.html Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden] | * [http://boingboing.net/2013/09/05/report-nsa-slices-through-mos.html Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden] | ||
* [http://news.cnet.com/8301-13578_3-57602246-38/amid-nsa-uproar-encryption-standards-body-defends-process/ Amid NSA uproar, encryption-standards body defends process] | * [http://news.cnet.com/8301-13578_3-57602246-38/amid-nsa-uproar-encryption-standards-body-defends-process/ Amid NSA uproar, encryption-standards body defends process] | ||
+ | * [http://blogs.fsfe.org/greve/?p=634 STEED: project to create nonproprietary encryption] |
Revision as of 23:48, 20 September 2013
Contents[hide] |
Ciphers
Cryptographic hash functions
For non-cryptographic hash functions, see Error detection and correction.
Formats and protocols
Miscellaneous
See also
See also Security. Various other formats, including compression, archiving, and filesystem formats, may support encryption as a built-in feature or through plug-ins.
External links
- 70-year old code uncracked
- 7 Codes You’ll Never Ever Break
- Breaking Hard-Disk Encryption
- One way to keep your documents secure...
- Password Cracking AES-256 DMGs and Epic Self-Pwnage
- Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not
- SSL: Intercepted today, decrypted tomorrow
- World's most mysterious manuscript has genuine message
- Is It the Dawn of the Encryption App?
- Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden
- Amid NSA uproar, encryption-standards body defends process
- STEED: project to create nonproprietary encryption