Topix.net
Advanced Search
Enter ZIP, City or News Search

Cryptography News

Donate to the Red Cross
Web 2.0 Conference

Cryptography News continually updated from thousands of sources around the net.

Front Page > Science News > Cryptography
Tallika announces immediate availability of broad array of IPSEC Cores
Us.design-reuse.com | Monday
"Tallika's team has a solid reputation and a long track record of delivering cutting edge Information Security solutions.2.7
Certicom speeds digital signature verification
Federal Computer Week | Monday Aug 22
BY Michael Arnone Published on Aug. 22, 2005 More Related Links Certicom Corp. has developed a way to speed up the verification of digital signatures, company officials announced last week.2.7
WU is home to rare collection of coded books
St. Louis Post-Dispatch | Saturday Aug 13
This very early treatise on cryptography was probably first published in 1518. The work describes both substitution and transposition ciphers.2.9
Development of New Cryptography Communications Technology to Block Wiretapping
English Dong-A | Monday Aug 8
Korean researchers have developed new cryptography communications technology which makes wiretapping impossible in the first place.2.7
Embedded Linux Offers New Opportunities in Comm Access Arena
Electronic Design | Monday Aug 8
The communications access arena is rapidly changing. This highly dynamic market, with its many emerging standards and protocols, has become increasingly cost-sensitive. Developers must not only bring to market ...2.7
Results of nCipher 'Cryptography in the Enterprise" Survey 2005
Ebcvg.com | Aug 2, 2005
Easily archive Exchange Server mail & comply with Sarbanes Oxley - Free evaluation available.2.7
Throwing Cryptography A Curve Ball
Security Pileline | Aug 1, 2005
A quick look back through the history of cryptography makes one thing perfectly clear: Security is never absolute.2.7
Unsolved Codes
Bellaonline.com | Jul 30, 2005
While browsing the web, as I frequently do, I came across a site with links to all sorts of famous unsolved codes.2
Schneier muses on how much data we carry around
Microsoft.weblogsinc.com | Jul 30, 2005
If you work in the world of info security, you know Bruce Schneier's name. He wrote the Blowfish cipher.2.7
Privacy Pioneer Promises Secure VOIP
PC Magazine | Jul 30, 2005
LAS VEGAS,Phil Zimmermann, the celebrated cryptographer who created PGP for e-mail encryption, is taking a shot at securing VOIP communications.4.6
Computer geeks gather for 'What the Hack'
Florida Today | Jul 29, 2005
This is the three-day "What The Hack" convention, a self-styled computer-security conference dealing such issues as digital passports, biometrics and cryptography.2.7
Information Security - Algorithm Agility & OATH
Issj.sys-con.com | Jul 28, 2005
HOTP, the HMAC-based One-Time Password algorithm, was introduced by OATH, a consortium organized last year to promote OTP technology.2.7
Software Security Code Review: Code Inspection Finds Problems
Software Magazine | Jul 26, 2005
Software Security Code Review: Code Inspection Finds Problems by Rudolph Araujo and Mark Curphey Inspections allow development teams to leverage the biggest advantage they have over attackers + in-depth ...2.9
NTT advances quantum crypto key distribution
Computerworld | Jul 26, 2005
In what could be a step forward in the development of quantum cryptography systems, a Japanese laboratory has demonstrated that it can send quantum keys through an optical switch designed for normal optical ...2.7
Cryptography is Next Generation Security
Ebcvg.com | Jul 26, 2005
Author: IT-Observer Staff Monday, 25 July 2005, 20:21 GMT Encryption will play an increasingly central role in the future of mainstream enterprise security.2.7
Protect sensitive data with hashing in .NET
Builder.com | Jul 25, 2005
Due to the increasing number of security threats, cryptography is a must for most application development projects.2.7
July 21, 2005 Newsletter
Microwaves & RF | Jul 22, 2005
Toshiba MOSFETs reduce on-resistance and increase switching speed.With competitive voltages and packaging, they are ideal for electronic equipment such as DC to DC converter, motor drive or portable PC designs.2.7
Managing XML Encryption with Java
Devx.com | Jul 20, 2005
ML Encryption provides end-to-end security for applications that require secure exchange of structured data.2.7
Quantum decoys foil code-breaking attempts
Oemagazine.com | Jul 20, 2005
Computer code-makers may soon get the upper hand on code-breakers thanks to a new quantum cryptography method designed at the University of Toronto.4.5
New boss takes over at Langley intel unit
Daily Press | Jul 9, 2005
BY JOHN M.R. BULL 247-4768 Published July 9, 2005 HAMPTON -- She's an Air Force colonel, Harvard graduate and a self-taught cryptologist.2.7
Interest soars in solving the CIA's 'Kryptos'
CTV.ca | Jul 6, 2005
For 15 years, a sculpture known as Kryptos has stood in a courtyard inside the heavily guarded Central Intelligence Agency headquarters in Langley, Virginia.2.9
Keeping email under lock and (public) key
NewsForge.com | Jul 1, 2005
With governments and law enforcement organizations pushing for increasingly intrusive monitoring and logging of business email messages, network administrators are put in an uncomfortable situation.2.7
Cavium Networks Introduces the Broadest Security Solutions for WiMAX Base Stations and CPEs
Rednova.com | Jun 28, 2005
Cavium Networks, a worldwide leader in security, network services and embedded processor solutions, today introduced the broadest security solutions for WiMAX based equipment ranging from Customer Premises ...2.7
The benefits of patents
Computer Shopper | Jun 21, 2005
Richard Stallman doesn't like the proposed EU directive which would legalize software patents in the European Union.2.7
VIA PadLock—Wicked Fast Encryption
Linux Journal (Registration Required) | Jun 20, 2005
ENGINE_load_builtin_engines(); ENGINE_register_all_complete(); [...] } See the evp man page from the OpenSSL documentation for details.2.7
TPMs and copyright
P2pnet.net | Jun 15, 2005
The problem with these policy proposals is: while technological protection measures can be ... What TPMs do Cryptography is the most commonly used form of TPM.1.3
Largest Privately Owned Supercomputer
Slashdot | Jun 15, 2005
Largest Privately Owned Supercomputer . What's really bad about the NSA is not just the computing power they likely wield , but also the theoretical power in the form of mathematicians.2.7
Success in distributing single photons for quantum cryptography via an optical switch
Physorg.com | Jun 14, 2005
Application of single photon interference phenomena that had annoyed Prof. Einstein Nippon Telegraph and Telephone Corp.2.7
Cooking with Linux - Fran ois, Can You Keep a Secret?
Linux Journal (Registration Required) | Jun 15, 2005
By Marcel Gagn on Thu, 2004-04-01 00:00. Learn the fundamentals of public key encryption and how to plug the GNU Privacy Guard in to your existing mailer.2.7
Ritz Disposable Digital Camera Hacked
Slashdot | Jun 7, 2005
This discussion has been archived. No new comments can be posted. Ritz Disposable Digital Camera Hacked .2.7
Has Ransomware Learned from Cryptovirology?
Newsfactor.com | Jun 3, 2005
The e-mail had a link to an Associated Press article that described an apparent online extortion attempt.2.7
Cryptography - Page 2 4
Get news alerts for this page 4
 Subscription Site30-day free trial 
Encryption Must Move Beyond SHA
Computerworld via KeepMedia.com | Aug 30, 2004
At the Crypto 2004 conference in Santa Barbara, Calif., this month, researchers announced several weaknesses in common hash functions.
More KeepMedia Articles 4

 
 
Ask questions, get answers www.wondir.com
 
Deputy House Speaker says SDPRP I instrumental in bringing about improvement
Walta Information Centre
Dirty snowball? More like a snowy dirtball
Star Tribune
 
Pioneer's Niebur to Lead Crop Genetics for DuPont
Ag Professional
Chilling/Heating Dry Bath
Biosciencetechnology.com
Prof. donates $105 mil to med school
Washington Square News
UMass Amherst Office of News & Information : News Releases : “Six Degrees of Separation” Theory Explained in New Algorithm by UMass Amherst Researchers
Campus Chronicle
Paleontologist talks fish fossils at Armour Heights
North York Mirror
 
 
elapsed time: 0.090 seconds