2011-4-15
 
Account:
 
Password:
     
Home | E-Business | Technology | Software Engineering | Security | Education | Outsourcing
Technology
Internet of Things/EPC 
Audio Mining & Voice Portal
Pen Computing
Creativity & Innovation
Creativity Techniques 
Semantic Web
Web Intelligence
Adaptive Web
Data Warehouse ...
P2P Computing
Interspace
Digital Game ...
Real-Time Computing
Data Synchronization
Component Framework
Middleware
Multimedia
Product Line ...
Software Mass ...
Embedded Apps ...
Embedded Testing
Real-Time OS
Embedded DB
Programmable DSP
Electronic Design ...
Codesign
Security Technology
DRM
Trends in IT
Artificial Intelligence
Open Source
OLAP/Data Mining
e-Business
AOP
GP
CSCW
Workflow Management
Bioinformatics
DNA Computing
Quantum Computing
HPC
Parallel Computing
Internet
New Tech Resources
Blog
RSS
Wi-Fi
LMDS
Wireless Application
Pervasive Computing
Flexible Transistor
Document Clustering
Document English 
 
 Content
Experts  
Industry Report
Shanghai SPIN  
Services
 Column
Tom Gilb
Q & A
Advanced Inspections
Inspection Economics
Evo Project Management
 
Encryption
 
What Is Cryptography
http://security.ittoolbox.com/nav/t.asp?t=326&p;=326&h1;=326
Data Encryption Techniques
http://security.ittoolbox.com/documents/document.asp?i=1014
The Encryption Tutorial
http://security.ittoolbox.com/documents/document.asp?i=997
http://hotwired.lycos.com/webmonkey/programming/php/tutorials/tutorial1.html
An Introduction To The Use Of Encryption
http://serendipity.magnet.ch/hermetic/crypto/intro.htm
Introduction To Cryptography
http://security.ittoolbox.com/documents/document.asp?i=473
http://security.ittoolbox.com/documents/document.asp?i=928
http://www.ssh.com/tech/crypto/intro.cfm
Cryptography: The Study of Encryption
http://world.std.com/~franl/crypto.html
Data Encryption Standard (DES) FIPS PUB 46-3
http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
Triple DES Encryption Overview
http://www.tropsoft.com/strongenc/des3.htm
International Data Encryption Algorithm (IDEA)
http://www.cs.nps.navy.mil/curricula/tracks/security/notes/chap04_43.html
http://home.ecn.ab.ca/~jsavard/crypto/co0404.htm
The Twofish Encryption Algorithm: A 128-Bit Block Cipher (Book) 1999
http://www.wiley.com/cda/product/0,,0471353817,00.html
The Twofish Encryption Algorithm
http://www.ddj.com/articles/1998/9812/
RC4 Encryption Algorithm
http://www.ncat.edu/~grogans/algorithm_history_and_descriptio.htm
U.S. approves stronger encryption standard (AES)
http://news.com.com/2100-1017-276619.html?legacy=cnet
Advanced Encryption Standard (AES) FIPS-197
http://csrc.nist.gov/encryption/aes/
http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
Overview of The AES Development Effort
http://csrc.nist.gov/encryption/aes/index2.html#overview
RSA Enters Proposal for New U.S. Advanced Encryption Standard
http://www.rsasecurity.com/news/pr/980415-2.html
RSA Security: RSA-L
http://www.openitx.com/g/RSA_Security/RSA-L.asp
RSA Encryption Version 1.5
http://www.imc.org/rfc2313
RSA Algorithm Javascript Page
http://www.orst.edu/dept/honors/makmur/
Message Digest 5 (MD5)
http://userpages.umbc.edu/~mabzug1/cs/md5/md5.html
On the Security of Diffie-Hellman Algorithm
http://security.ece.orst.edu/seminars/rodri1/
A Review of the Diffie-Hellman Algorithm and its Use in Secure Internet Protocols
http://rr.sans.org/encryption/algorithm.php
Cryptographic Toolkit
http://csrc.nist.gov/encryption/
Cryptographic Application Program Interface (CAPI)
http://itreports.computerworld.com/data/detail?id=994949327_622&type;=RES&x;=708206540
Public Key Infrastructure (PKI)
http://security.ittoolbox.com/nav/t.asp?t=311&p;=311&h1;=311
The PKI: Paving the Way for Secure E-Business
http://security.ittoolbox.com/documents/document.asp?i=561
Understanding PKI
http://security.ittoolbox.com/documents/document.asp?i=563
PKI Securing the Future of Communications
http://security.ittoolbox.com/documents/document.asp?i=2538
Implementing PKI
http://security.ittoolbox.com/documents/document.asp?i=1687
PKI Task Force
http://www.cio-dpi.gc.ca/pki-icp/
Ten Risks of PKI: What Are You Not Being Told About PKI
http://security.ittoolbox.com/documents/document.asp?i=950
PKI & LDAP Directory The Path To eBusiness Security
http://itreports.computerworld.com/data/detail?id=1009495771_203&type;=RES&x;=87919460
nCipher Security World White Paper
http://itreports.computerworld.com/data/detail?id=1013457456_401&type;=RES&x;=2009393237
PKI: What's The Hold Up
http://itreports.computerworld.com/data/detail?id=1014776900_902&type;=RES&x;=869792460
The IEEE P1363 Home Page Standard Specifications For Public-Key Cryptography
http://grouper.ieee.org/groups/1363/
The End of the RSA Patent Less Barriers Than Ever to the Use of Public Key Cryptography
http://itreports.computerworld.com/data/detail?id=975966105_94&type;=RES&x;=1320318424
Non-Repudiation in The Digital Environment
http://www.firstmonday.dk/issues/issue5_8/mccullagh/
WEBTRUST SERVICES: Non-Repudiation Principle
http://www.webtrust.net/nonrepudiation.shtml
The Secure Hash Algorithm Directory MD5, SHA-1 and HMAC Resources
http://www.secure-hash-algorithm-md5-sha-1.co.uk/
Secure Hash Standard: Secure Hash Algorithm SHA-1 FIPS 180-1
http://www.itl.nist.gov/fipspubs/fip180-1.htm
Data Validation Using MD5 Hash
http://www.forensics-intl.com/art12.html
MD5 Message Digest Program
http://ourworld.compuserve.com/homepages/pagrosse/hash.htm
Elliptic Curve Cryptosystems
http://www.rsasecurity.com/rsalabs/ecc/elliptic_curve.html
Cryptography and Elliptic Curves
http://www.tcs.hut.fi/~helger/crypto/link/public/elliptic/
What Is Quantum Computing & Cryptography
http://www.hack.gr/users/dij/crypto/overview/new.html
What Is Quantum Cryptography
http://www.qubit.org/intros/crypt.html
A Bibliography of Quantum Cryptography
http://www.cs.mcgill.ca/~crepeau/CRYPTO/Biblio-QC.html
Quantum Computation/Cryptography at Los Alamos
http://qso.lanl.gov/qc/
Quantum Cryptography in Norway
http://www.fysel.ntnu.no/Optics/qcr/
What Is DNA Computing On Cryptography
http://www.rsasecurity.com/rsalabs/faq/7-19.html
List of Publications in Molecular Computing and Bioinformatics
http://ls11-www.cs.uni-dortmund.de/people/banzhaf/molcomp.html
Download Cryptography/DNA Computing White Papers
http://www.chem.duke.edu/~pirrung/index8.html
Voice Encryption
http://www.sevenlocks.com/SWVoiceEncryption.htm
Technical Discussion On Voice Encryption Methods
http://www.tccsecure.com/voicecrp.htm
End-To-End Voice Encryption Tools
http://munitions.iglu.cjb.net/dolphin.cgi?action=render&category;=07
Commercial Encryption Export Control
http://www.bxa.doc.gov/Encryption/Default.htm
CDT Encryption Issues Page
http://www.cdt.org/crypto/
Encryption & Security-related Resources
http://www.cs.auckland.ac.nz/~pgut001/links.html
Cryptography Resources
http://www.crypto.com/
http://www.scs.carleton.ca/~csgs/resources/crypt.html
Cryptography for Visual Basic
http://www.cryptovb.com/
W3C XML Encryption Working Group
http://www.w3.org/Encryption/2001/
 
 

 Links: ACM || CiteSeer || CMU SEI || Construx || Cutter || IEEE-CS || itmWEB
Shanghai IT || Shanghai Economic Commission || SSIA || Shanghai Component Repository
LJYW || SPRT || PKSPIN || CCW Shanghai || China IT Outsourcing Summit more 
contribution guide | FAQ | about | copyright | contact
last update on 2005-04-08
better use IE 5.0 or above (800*600 or above)
© 2000-2005 Software Export and IT Transfer Center, ASTI Shanghai
All Rights Reserved.