Encryption

From Just Solve the File Format Problem
(Difference between revisions)
Jump to: navigation, search
(See also)
(Miscellaneous)
Line 81: Line 81:
 
* [http://www.theonion.com/articles/fasttalking-computer-hacker-just-has-to-break-thro,32000/ Fast-Talking Computer Hacker Just Has To Break Through Encryption Shield Before Uploading Nano-Virus (The Onion)]
 
* [http://www.theonion.com/articles/fasttalking-computer-hacker-just-has-to-break-thro,32000/ Fast-Talking Computer Hacker Just Has To Break Through Encryption Shield Before Uploading Nano-Virus (The Onion)]
 
* [http://io9.com/check-out-the-cipher-from-an-assassination-attempt-on-q-1567478070 Check Out the Cipher from an Assassination Attempt on Queen Elizabeth]
 
* [http://io9.com/check-out-the-cipher-from-an-assassination-attempt-on-q-1567478070 Check Out the Cipher from an Assassination Attempt on Queen Elizabeth]
 +
* [http://regmedia.co.uk/2014/05/16/0955_peter_gutmann.pdf Crypto Won’t Save You Either]

Revision as of 01:13, 17 May 2014

File Format
Name Encryption
Ontology

{{{caption}}}

Contents

Ciphers

Cryptographic hash functions

For non-cryptographic hash functions, see Error detection and correction.

Password hashes

Formats and protocols

Digital rights management (DRM)

Miscellaneous

See also

See also Security for information on digital certificates and electronic signing. Various other formats, including compression, archiving, and filesystem formats, may support encryption as a built-in feature or through plug-ins.

External links

Security techniques

Code breaking, bugs, and back doors

Unsolved codes/ciphers

Miscellaneous

Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox