Encryption
From Just Solve the File Format Problem
(Difference between revisions)
Dan Tobias (Talk | contribs) (→External links) |
(→Cryptographic hash functions) |
||
Line 16: | Line 16: | ||
* [[SHA-1]] | * [[SHA-1]] | ||
* [[SHA-2]] | * [[SHA-2]] | ||
+ | * [[SHA-3]] | ||
For non-cryptographic hash functions, see [[Error detection and correction]]. | For non-cryptographic hash functions, see [[Error detection and correction]]. | ||
Revision as of 00:00, 27 September 2013
Contents[hide] |
Ciphers
Cryptographic hash functions
For non-cryptographic hash functions, see Error detection and correction.
Formats and protocols
Miscellaneous
See also
See also Security. Various other formats, including compression, archiving, and filesystem formats, may support encryption as a built-in feature or through plug-ins.
External links
- 70-year old code uncracked
- 7 Codes You’ll Never Ever Break
- Breaking Hard-Disk Encryption
- One way to keep your documents secure...
- Password Cracking AES-256 DMGs and Epic Self-Pwnage
- Laws of Physics Say Quantum Cryptography Is Unhackable. It’s Not
- SSL: Intercepted today, decrypted tomorrow
- World's most mysterious manuscript has genuine message
- Is It the Dawn of the Encryption App?
- Report: NSA slices through most 'net encryption, according to 'Bullrun' documents leaked by Snowden
- Amid NSA uproar, encryption-standards body defends process
- STEED: project to create nonproprietary encryption