2011年7月27日
 
用户名:
密码:
 
新闻快递 | 原创文档 | 咨询培训 | 专家顾问 | 个人专栏 | CSDP | 产业报告 | 上海SPIN | 读编往来
首页 | 企业信息化 | 技术新热点 | 成才乐园New! | 软件工程 | 信息安全 | IT教育 | 软件出口 | 网站论坛
技术新热点
物联网/产品电子代码 
语音挖掘和语音门户
笔计算/输入
论创新
创造性... 
语义Web
Web 智能
自适应Web
数据仓库及挖掘
P2P计算
互联空间
数字游戏开发
实时监控
数据同步
构件框架
中间件技术
多媒体技术
产品线工程
软件规模客户化
嵌入式应用与系统
嵌入式测试
实时操作系统
嵌入式数据库
可编程DSP
电子设计自动化
协同设计
安全性
数字版权管理
技术动态趋势
人工智能
开放源程序
在线分析/数据挖掘
电子商务工程
面向方面程序
再生式程序
计算机支持协同工作
工作流管理
生物信息学
分子计算
量子计算
高性能计算
并行计算
互联网技术
新技术信息资源
博客
RSS
无线局域网
无线固定宽带技术
无线应用
普及计算
柔软晶体管
文档聚类
文档工程 
 
 
加密技术
 
What Is Cryptography
http://security.ittoolbox.com/nav/t.asp?t=326&p;=326&h1;=326
Data Encryption Techniques
http://security.ittoolbox.com/documents/document.asp?i=1014
The Encryption Tutorial
http://security.ittoolbox.com/documents/document.asp?i=997
http://hotwired.lycos.com/webmonkey/programming/php/tutorials/tutorial1.html
An Introduction To The Use Of Encryption
http://serendipity.magnet.ch/hermetic/crypto/intro.htm
Introduction To Cryptography
http://security.ittoolbox.com/documents/document.asp?i=473
http://security.ittoolbox.com/documents/document.asp?i=928
http://www.ssh.com/tech/crypto/intro.cfm
Cryptography: The Study of Encryption
http://world.std.com/~franl/crypto.html
Data Encryption Standard (DES) FIPS PUB 46-3
http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
Triple DES Encryption Overview
http://www.tropsoft.com/strongenc/des3.htm
International Data Encryption Algorithm (IDEA)
http://www.cs.nps.navy.mil/curricula/tracks/security/notes/chap04_43.html
http://home.ecn.ab.ca/~jsavard/crypto/co0404.htm
The Twofish Encryption Algorithm: A 128-Bit Block Cipher (Book) 1999
http://www.wiley.com/cda/product/0,,0471353817,00.html
The Twofish Encryption Algorithm
http://www.ddj.com/articles/1998/9812/
RC4 Encryption Algorithm
http://www.ncat.edu/~grogans/algorithm_history_and_descriptio.htm
U.S. approves stronger encryption standard (AES)
http://news.com.com/2100-1017-276619.html?legacy=cnet
Advanced Encryption Standard (AES) FIPS-197
http://csrc.nist.gov/encryption/aes/
http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
Overview of The AES Development Effort
http://csrc.nist.gov/encryption/aes/index2.html#overview
RSA Enters Proposal for New U.S. Advanced Encryption Standard
http://www.rsasecurity.com/news/pr/980415-2.html
RSA Security: RSA-L
http://www.openitx.com/g/RSA_Security/RSA-L.asp
RSA Encryption Version 1.5
http://www.imc.org/rfc2313
RSA Algorithm Javascript Page
http://www.orst.edu/dept/honors/makmur/
Message Digest 5 (MD5)
http://userpages.umbc.edu/~mabzug1/cs/md5/md5.html
On the Security of Diffie-Hellman Algorithm
http://security.ece.orst.edu/seminars/rodri1/
A Review of the Diffie-Hellman Algorithm and its Use in Secure Internet Protocols
http://rr.sans.org/encryption/algorithm.php
Cryptographic Toolkit
http://csrc.nist.gov/encryption/
Cryptographic Application Program Interface (CAPI)
http://itreports.computerworld.com/data/detail?id=994949327_622&type;=RES&x;=708206540
Public Key Infrastructure (PKI)
http://security.ittoolbox.com/nav/t.asp?t=311&p;=311&h1;=311
The PKI: Paving the Way for Secure E-Business
http://security.ittoolbox.com/documents/document.asp?i=561
Understanding PKI
http://security.ittoolbox.com/documents/document.asp?i=563
PKI Securing the Future of Communications
http://security.ittoolbox.com/documents/document.asp?i=2538
Implementing PKI
http://security.ittoolbox.com/documents/document.asp?i=1687
PKI Task Force
http://www.cio-dpi.gc.ca/pki-icp/
Ten Risks of PKI: What Are You Not Being Told About PKI
http://security.ittoolbox.com/documents/document.asp?i=950
PKI & LDAP Directory The Path To eBusiness Security
http://itreports.computerworld.com/data/detail?id=1009495771_203&type;=RES&x;=87919460
nCipher Security World White Paper
http://itreports.computerworld.com/data/detail?id=1013457456_401&type;=RES&x;=2009393237
PKI: What's The Hold Up
http://itreports.computerworld.com/data/detail?id=1014776900_902&type;=RES&x;=869792460
The IEEE P1363 Home Page Standard Specifications For Public-Key Cryptography
http://grouper.ieee.org/groups/1363/
The End of the RSA Patent Less Barriers Than Ever to the Use of Public Key Cryptography
http://itreports.computerworld.com/data/detail?id=975966105_94&type;=RES&x;=1320318424
Non-Repudiation in The Digital Environment
http://www.firstmonday.dk/issues/issue5_8/mccullagh/
WEBTRUST SERVICES: Non-Repudiation Principle
http://www.webtrust.net/nonrepudiation.shtml
The Secure Hash Algorithm Directory MD5, SHA-1 and HMAC Resources
http://www.secure-hash-algorithm-md5-sha-1.co.uk/
Secure Hash Standard: Secure Hash Algorithm SHA-1 FIPS 180-1
http://www.itl.nist.gov/fipspubs/fip180-1.htm
Data Validation Using MD5 Hash
http://www.forensics-intl.com/art12.html
MD5 Message Digest Program
http://ourworld.compuserve.com/homepages/pagrosse/hash.htm
Elliptic Curve Cryptosystems
http://www.rsasecurity.com/rsalabs/ecc/elliptic_curve.html
Cryptography and Elliptic Curves
http://www.tcs.hut.fi/~helger/crypto/link/public/elliptic/
What Is Quantum Computing & Cryptography
http://www.hack.gr/users/dij/crypto/overview/new.html
What Is Quantum Cryptography
http://www.qubit.org/intros/crypt.html
A Bibliography of Quantum Cryptography
http://www.cs.mcgill.ca/~crepeau/CRYPTO/Biblio-QC.html
Quantum Computation/Cryptography at Los Alamos
http://qso.lanl.gov/qc/
Quantum Cryptography in Norway
http://www.fysel.ntnu.no/Optics/qcr/
What Is DNA Computing On Cryptography
http://www.rsasecurity.com/rsalabs/faq/7-19.html
List of Publications in Molecular Computing and Bioinformatics
http://ls11-www.cs.uni-dortmund.de/people/banzhaf/molcomp.html
Download Cryptography/DNA Computing White Papers
http://www.chem.duke.edu/~pirrung/index8.html
Voice Encryption
http://www.sevenlocks.com/SWVoiceEncryption.htm
Technical Discussion On Voice Encryption Methods
http://www.tccsecure.com/voicecrp.htm
End-To-End Voice Encryption Tools
http://munitions.iglu.cjb.net/dolphin.cgi?action=render&category;=07
Commercial Encryption Export Control
http://www.bxa.doc.gov/Encryption/Default.htm
CDT Encryption Issues Page
http://www.cdt.org/crypto/
Encryption & Security-related Resources
http://www.cs.auckland.ac.nz/~pgut001/links.html
Cryptography Resources
http://www.crypto.com/
http://www.scs.carleton.ca/~csgs/resources/crypt.html
Cryptography for Visual Basic
http://www.cryptovb.com/
W3C XML Encryption Working Group
http://www.w3.org/Encryption/2001/
 
 

 友情链接: ACM || CiteSeer || CMU SEI || Construx || Cutter || IEEE-CS || itmWEB
上海市信息委 || 上海市经委 || 上海市软件行业协会 || 上海构件库
TechTarget || 珞珈远望 || 浦华瑞信 || 北京SPIN || CCW聚焦华东 || 软件出口网 更多 
最近更新日 2005.06.28
建议使用IE5.0以上版本(800*600以上) 小字体 浏览
© 2000-2005 软件出口和信息技术传播中心 制作维护: ASTI Shanghai 沪ICP备05025271号
保留所有权益