Crypt

Results: 686



#Item
561

Prinzipielles Modes of Operation DM-Crypt

Add to Reading List

Source URL: paulasmuth.com

Language: German - Date: 2013-10-08 17:36:14
    562Pseudorandom number generators / Entropy / National Security Agency / Advanced Encryption Standard / Cryptographic hash function / Random number generation / Hash function / Key / Crypt / Cryptography / Randomness / Information theory

    Comments on SP 800-90A[removed]Paul Lambert ............................................................................................................................ 2 Ashit Vora, Acumen Security ......................

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2014-06-11 14:30:31
    563Passphrase / NetBSD / /dev/random / PKCS / PBKDF2 / File system / Key generation / Crypt / Cryptography / Cryptography standards / Randomness

    CGDCONFIG (8) NetBSD System Manager’s Manual CGDCONFIG (8)

    Add to Reading List

    Source URL: www.imrryr.org

    Language: English - Date: 2004-02-26 15:48:53
    564SHACAL / RC6 / RC5 / SHA-1 / SHA-2 / NESSIE / Crypt / Outline of cryptography / Encryption by date / Cryptography / Block ciphers / Cryptographic hash functions

    Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V Yong-Sork HER*, Kouichi SAKURAI

    Add to Reading List

    Source URL: ccc.ustc.edu.cn

    Language: English - Date: 2006-10-24 07:55:02
    565Portable software / Password Authenticated Key Exchange by Juggling / Password-authenticated key agreement / Password / Google Chrome / Firefox / Dropbox / Crypt / Phishing / Software / Cryptographic protocols / Cryptography

    How To Syn with Ali e 1 Feng Hao 1

    Add to Reading List

    Source URL: homepages.cs.ncl.ac.uk

    Language: English - Date: 2011-06-15 13:41:44
    566Password / Security token / Crypt / Random password generator / Password cracking / Security / Cryptography / Computer security

    White Paper Picking a Sensible Mobile Password Policy SilverSky 440 Wheelers Farm Road Suite 202 Milford CT 06461  silversky.com

    Add to Reading List

    Source URL: www.silversky.com

    Language: English - Date: 2013-01-18 17:59:38
    567Chosen-plaintext attack / Block cipher / Advanced Encryption Standard / ICE / Crypt / Cipher / Data Encryption Standard / Cryptography / Format-preserving encryption / Ciphertext

    Public Comments on Draft SP 800-38G (2014); analysis of VAES3 (FF2)

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2014-06-27 11:58:21
    568Disk encryption / System software / Portable Document Format / Crypt / Password / QPDF / BitLocker Drive Encryption / Security and safety features new to Windows Vista / Computing / Software / Cryptographic software

    QPDF Manual For QPDF Version 5.1.2, June 7, 2014 Jay Berkenbilt QPDF Manual: For QPDF Version 5.1.2, June 7, 2014 Jay Berkenbilt

    Add to Reading List

    Source URL: qpdf.sourceforge.net

    Language: English - Date: 2014-06-07 18:03:16
    569Computer security / Mozilla add-ons / Key management / Password / LastPass Password Manager / PBKDF2 / Keychain / Key derivation function / Crypt / Cryptography / Software / Cryptographic software

    “Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd. {a.belenko, d.sklyarov} @ elcomsoft . com http://www.elcomsoft.com

    Add to Reading List

    Source URL: www.elcomsoft.com

    Language: English - Date: 2014-01-15 02:15:56
    570Email / Cryptographic software / PGP / Internet privacy / Privacy software / Pretty Good Privacy / GNU Privacy Guard / Encryption / Crypt / Cryptography / Computing / Computer security

    Finnish Customs Information Management Transmitting data on internal trade by e-mail Page 1(3)

    Add to Reading List

    Source URL: www.tulli.fi

    Language: English - Date: 2013-04-25 03:36:18
    UPDATE