E-mail this definition to a colleague
VeriSign: SSL Certificates
Protect your site with the strongest security possible and it will help increase customers' trust in your e-business. Learn more about VeriSign SSL.
DiscountID: Authentication Products
ID Card Printers from Fargo, Zebra-Eltron, Evolis, Magicard, and Datacard. Complete Photo Identification Systems, Ribbons and Cards.
Symantec: Virus Security and Removal
Stop Zotob Virus now. Visit Symantec for updated information and resources.
The contents of a U.S. Army field document detailing basic cryptanalysis.
Cryptography and Security Resources
Excellent collection of links to cryptography and security pages. This site is maintained by Professor Ronald Rivest, creator of the MD5 message-digest algorithm.
Cryptography for encryption, digital signatures and authentication
Contains links to information on cryptography, a tutorial on public key encryption for secrecy and a discussion of the debate regarding government control of cryptography.
Analysis of digital rights management technology.
NIST computer security resource clearinghouse
National Institute of Standards and Technology's computer security resource clearinghouse. It contains information on numerous security topics, as well as alerts about viruses and other security threats.
RSA Data Security home page
Site of RSA Data Security Inc, creators of the RSA encryption technology used in Netscape Navigator, Quicken, Lotus Notes, and hundreds of other products.
SSH - Cryptography A-Z
This page lists international sources of cryptographic software, information on cryptographic methods, algorithms, and protocols. Materials cover encryption, decryption, cryptanalysis, steganography (hiding information), software, tools, information, and assessments about cryptographic methods.
The Clinton Administration's statement on commercial encryption policy
Describes a proposed framework that would encourage the use of strong encryption in commerce and private communications while protecting the public safety and national security. Also contains a section on the U.S. Cryptography Policy. (July 1996)
Provides links to several USENET FAQs focusing on cryptography.
This site covers the historical development of cryptography from 1900 BC to the present. Much of the material is taken from book entitled, "The Codebreakers", written by David Kahn.
Contains information about cryptography research and commercial products. Look here for information (including photos) about the clipper chip and the clipper key escrow system.
Cryptanalysis resources, including tutorials, papers and case studies.
Encryption Policy Resource page
An issues-oriented site containing information United States encryption export restrictions, with links to articles, legislation, events, initiatives, and policies.
EPIC's cryptography policy page
Electronic Privacy Information Center (EPIC) cryptography site. There are links to news and documents, policies, and resources related to cryptography and the clipper chip.
International Association for Cryptologic Research (IACR) site
Contains information on upcoming IACR conferences and workshops, publications, and membership information.
Quadralay Cryptography Archive
Contains links to information on the Clipper chip, computer security issues, encryption policy resources, information liberation organizations, and the Macintosh Cryptography Interface Project.
The International Association for Cryptologic Research (IACR)
This site hosts the research activities of the International Association for Cryptologic Research (IACR).
Yahoo!'s cryptography page
Yahoo!'s directory of cryptography links.
Citrix® NetScaler® Security Solution
Secure your applications against attack. Download a White Paper now!
Fargo Electronics: Access Authentication
Supplies access authentication systems to control access to facilities and networks, monitor time and attendance, and visually identify people.