Crypt

Results: 686



#Item
501Crypt / Cryptographic hash functions / Computing / Applied mathematics / Cyberwarfare / Cryptography / Hashing / MD5

Wang’s sufficient conditions of MD5 are not sufficient Jun Yajima and Takeshi Shimoyama FUJITSU LABORATORIES LTD. {jyajima,shimo}@labs.fujitsu.com Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-08-10 09:35:42
502Access control / Password / Passphrase / Crypt / Password strength / Password policy / Security / Computer security / Cryptography

UC San Diego Minimum Password Standards Last updated: June 6, 2014 Overview Passwords are an important aspect of computer security. They often serve as the first line of defense in preventing unauthorized access to campu

Add to Reading List

Source URL: blink.ucsd.edu

Language: English - Date: 2014-06-06 16:17:08
503Stream cipher / Cryptographic hash function / Pseudorandom number generator / Symmetric-key algorithm / Block cipher / Crypt / Cipher / Outline of cryptography / Cryptographically secure pseudorandom number generator / Cryptography / CRYPTREC / MUGI

Symmetric-Key Cryptographic Technique Evaluation Policy Toshinobu Kaneko Chair, Symmetric-Key Subcommittee (Science University of Tokyo)

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
504Cryptographic hash functions / Stream ciphers / Cryptographic primitive / Symmetric-key algorithm / Block cipher / Key size / Public-key cryptography / Crypt / VEST / Cryptography / Cryptography standards / CRYPTREC

Guidance for Submissions in[removed]Provisional Translation) I n f o r m a t i o n - t e c h n o l o g y P r o m o t i o n A g e n c y, J a p a n Telecommunications Advancement Organization of Japan

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
505Cryptographic hash functions / Crypt / Hashing / MD4 / MD5CRK / Cryptography / MD5 / Collision attack

Microsoft Word - Announcement-MD5-4.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-25 01:11:28
506PGP / Public-key cryptography / Key management / Privacy software / KGPG / Key generation / GNU Privacy Guard / Crypt / Encrypting File System / Cryptography / Software / Cryptographic software

PDF Document

Add to Reading List

Source URL: docs.kde.org

Language: English - Date: 2014-08-21 04:46:41
507

DCF Award Masterlist[removed]Adkins, Jan. A Storm Without Rain. Little, Brown. Gr. 6 Up. Arnosky, Jim. Secrets of a Wildlife Watcher. Lothrop. Gr. 4 Up. Bellairs, John. The Mummy, the Will, and the Crypt. Dutton. Gr. 4

Add to Reading List

Source URL: libraries.vermont.gov

Language: English - Date: 2011-06-08 15:49:13
    508Key management / Crypt / Hashing / Bcrypt / Salt / Password / Hash function / Key derivation function / MD5 / Cryptography / Search algorithms / Cryptographic software

    CRYPT(3) Library functions CRYPT(3)

    Add to Reading List

    Source URL: openwall.com

    Language: English - Date: 2009-09-07 19:42:15
    509Key schedule / ICE / Advantage / Skein / International Data Encryption Algorithm / Crypt / Cryptography / Block ciphers / Boomerang attack

    SHA-3 Conference, March 2012, A Study of practical-time distinguishing attacks against round-reduced Threefish-256

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-05-21 15:00:24
    510Password / Computer security / Crypt / Encryption / Cyberwarfare / Password manager / Sticky Password Manager / Cryptographic software / Cryptography / Disk encryption

    Cyber Alert: Heartbleed What is Heartbleed Heartbleed is a computer bug that attacks an organization’s computer servers. A server has encryption software to protect passwords, user ID and other personally identifiable

    Add to Reading List

    Source URL: ready.wi.gov

    Language: English - Date: 2014-04-11 09:52:45
    UPDATE