First Page | Meta Content | |
---|---|---|
Document Date: 2004-08-23 20:33:18Open Document File Size: 772,57 KBShare Result on FacebookCompanySimon & Schuster Trade / MIT Press / O’Reilly & Associates Inc. / PGP Corporation / Northern Telecom Ltd. / Aegean Park Press / Addison Wesley Longman Inc. / CRC Press / Export Information Export / John Wiley & Sons Inc. / Pearson / Ascom Tech AG / Doubleday & Company Inc. / Twofish / John Wiley & Sons / Contact PGP Corporation / /CountryUnited States / /EventPatent Issuance / /FacilityNational Institute of Standards and Technology / Building Internet Firewalls / /IndustryTermInternet Firewalls / communications security / mathematical tools / actual systems / appropriate decoding tool / cryptography Web / cryptographic algorithm / car chases / open and trusted security products / Internet Security / snake oil / symmetric algorithms / network protocols / encryption algorithm / insecure networks / /OrganizationInternational Association for Cryptologic Research / Internet Privacy Coalition / U.S. Department of Commerce / MIT / Center for Democracy and Technology / Senate / National Institute of Standards and Technology / Bureau of Export Administration / Electronic Privacy Information Center / International Association / Electronic Frontier Foundation / /PersonCharles Kaufman / Alfred Menezes / Jon Callas / Phil Zimmermann / Simon Cooper / Jean-Loup Gailly / Deborah Russell / Michael Elkins / Raph Levien / D. Brent Chapman / William R. Cheswick / Elizabeth D. Zwicky / Steven M. Bellovin / Simon Singh / Hal Finney / Steven Levy / Paul van Oorschot / Mike Speciner / David Kahn / Mark Adler / Mary / Bruce Schneier / Lutz Donnerhacke / Thomas Roessler / Radia Perlman / Dave del Torto / Rodney Thayer / /PositionCaptain / Editor / Queen / worldwide leader / spy / /ProductIDEA / /ProgrammingLanguageC / /PublishedMediumJournal of Cryptology / /SportsLeagueInternational Association / /TechnologyBlock Cipher / SSL / cryptographic algorithm / Encryption / Cryptography / 9 Encryption / strongest encryption / CAST encryption algorithm / network protocols / /URLwww.crypto.org / www.epic.org / www.pgpi.org / www.eff.org / www.wilyhacker.com / www.privacy.org / www.ietf.org/rfc/rfc3156.txt / www.philzimmermann.com / www.pgp.com / www.nist.gov/aes / www.cdt.org / www.ietf.org/rfc/rfc2440.txt / www.iacr.org / www.aegeanparkpress.com / /SocialTag |