Crypt

Results: 686



#Item
521Cryptography / Password / Shadow password / Salt / Crypt / Passwd / Password strength / Privileged password management / Security / Computer security / System software

Coping with the Threat of Computer Security Incidents: a Primer from Prevention through Recovery

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-11 15:44:59
522Public-key cryptography / Preimage attack / Hash function / Digital Signature Algorithm / Collision / Digital signature / Crypt / Collision attack / SHA-2 / Cryptography / Cryptographic hash functions / Hashing

NIST SP[removed], Randomized Hashing for Digital Signatures

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 13:45:25
523Password / Crypt / Internet / Technology / Internet privacy / Disk encryption / Email / Computing / Zip

FIELD OPERATIONS BUREAU FOOD STAMP UNIT (FSU) ______________________________________________ TRANSMITTAL NUMBER: 09-06 May 14, 2009 ________________________________________________________________________

Add to Reading List

Source URL: www.cdsscounties.ca.gov

Language: English - Date: 2009-06-11 12:17:20
524Key / Symmetric-key algorithm / FIPS 140-2 / Public-key cryptography / Crypt / Cryptographic key types / CRYPTREC / Cryptography / Key management / Cryptography standards

NIST SP[removed]Draft, Recommendation for Crytographic Key Generation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 15:09:20
525Cryptographic software / Microsoft CryptoAPI / Key generation / Key / Crypt / Public-key cryptography / Symmetric-key algorithm / Hash function / Password / Cryptography / Key management / Hashing

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
526Hash functions / Binary arithmetic / Cyclic redundancy check / HMAC / SHA-1 / Checksum / Crypt / Cksum / Hash list / Error detection and correction / Hashing / Cryptographic hash functions

Queensland Office of Gaming Regulation Hashing Algorithms (formerly titled ‘Program Signature Algorithms’) Version 1.5

Add to Reading List

Source URL: www.dia.govt.nz

Language: English - Date: 2011-05-04 23:52:02
527Cryptographic Module Validation Program / Elliptic curve cryptography / Advanced Encryption Standard / SHA-2 / FIPS 140 / Key size / SHA-1 / Digital signature / Crypt / Cryptography / Cryptography standards / FIPS 140-2

The Cryptographic Algorithm Validation Program

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:47
528Message authentication codes / Cryptographic hash functions / Advanced Encryption Standard / HMAC / SHA-2 / MD5 / SHA-1 / Crypt / Block cipher modes of operation / Cryptography / Error detection and correction / Hashing

Package ‘digest’ July 2, 2014 Version 0.6.4 Date $Date: 2013-12-02 21:56:30 -0600 (Mon, 02 Dec 2013) $ Author Dirk Eddelbuettel with contributions by Antoine Lucas, Jarek Tuszynski, Henrik Bengtsson,

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 11:37:57
529Identity management / Password manager / Password / Passphrase / Crypt / Password strength / Password policy / Security / Cryptography / Computer security

DELAWARE DEPARTMENT DTI OF

Add to Reading List

Source URL: dti.delaware.gov

Language: English - Date: 2014-04-03 14:31:30
530Access control / Password / Passphrase / Crypt / Password policy / Password manager / Cryptography / Security / Computer security

eSecurity Newsletter- January 2013

Add to Reading List

Source URL: dti.delaware.gov

Language: English - Date: 2013-01-16 14:07:42
UPDATE