Lots More Information
Related Articles
More Great Links
Sources
- CES Communications. "What is encryption?" May 8, 2004. (Aug. 25, 2008) http://www.cescomm.co.nz/about/encryption.html
- Holzmann, Gerard. "Tales from the encrypt." Inc.com. Dec. 2007. (Aug. 25, 2008) http://www.inc.com/magazine/19971215/1446.html
- Kay, Russell. "QuickStudy: biometric authentication." Computer World. April 4, 2005. (Aug. 25, 2008) http://www.computerworld.com/securitytopics/security/story/0,10801,100772,00.html
- The LEDA User Manual. "Symmetric key cryptography." Jan. 9, 2008. (Aug. 25, 2008) http://www.algorithmic-solutions.info/leda_manual/Symmetric_Key_Cryptography.html
- Martin, Frank. "SSL Certificates HOWTO." The Linux Documentation Project. Oct. 20, 2002. (Aug. 25, 2008) http://tldp.org/HOWTO/SSL-Certificates-HOWTO/index.html
- Newcomer, Joseph. "Checksum algorithm." Flounder.com. June 15, 2005. (Aug. 25, 2008) http://www.flounder.com/checksum.htm
- SSH Communications Security. "Cryptographic protocols and standards." (Aug. 25, 2008) http://www.ssh.com/support/cryptography/protocols/
- SSH Communications Security. "Public key cryptosystems." (Aug. 25, 2008) http://www.ssh.com/support/cryptography/algorithms/asymmetric.html