Crypt

Results: 686



#Item
571SHA-2 / SHA-1 / Secure Hash Standard / HMAC / NIST hash function competition / Digital Signature Algorithm / Crypt / Message authentication code / NSA Suite B Cryptography / Cryptography / Error detection and correction / Cryptographic hash functions

FIPS 180-4, Secure Hash Standard (SHS)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 10:52:30
572Alberta / Waterton / Crypt Lake Trail / Cameron Lake / Waterton Lakes National Park / Geography of Canada / Geography of Alberta

2013 Waterton Wildlife Weekend Community Partners Alpine Stables Wildlife on Horseback

Add to Reading List

Source URL: www.watertonwildlife.com

Language: English - Date: 2013-09-19 11:59:49
573Cemetery / Geography of the United States / Geography of Illinois / Culture / Chicago / Stanley Tigerman / Crypt

12 CHICAGO READER | JUNE 10, 2005 | SECTION ONE Architecture If It

Add to Reading List

Source URL: www.chicagoreader.com

Language: English - Date: 2009-07-16 18:34:28
574

_________________________________________________________________________________________________ Empire of Ice Pirate Ship Darklight Crypt Dragon`s Peak

Add to Reading List

Source URL: www.skylanders-encyclopedia.com

Language: German - Date: 2013-10-25 11:19:34
    575Randomness / Password / John the Ripper / Salt / Entropy / Crypt / MD5 / Password strength / Password policy / Cryptography / Computer security / Security

    The science of guessing: analyzing an anonymized corpus of 70 million passwords Joseph Bonneau Computer Laboratory University of Cambridge [removed]

    Add to Reading List

    Source URL: www.jbonneau.com

    Language: English - Date: 2014-05-03 16:10:03
    576Food colorings / Colon / Familial adenomatous polyposis / Celecoxib / Colorectal cancer / Aspirin / Aberrant crypt foci / Cancer / Animal testing on rodents / Medicine / Gastrointestinal cancer / Pathology

    European Journal of Cancer[removed]–1922 European Journal of Cancer www.ejconline.com

    Add to Reading List

    Source URL: tumor.free.fr

    Language: English - Date: 2005-09-01 11:30:59
    577SHA-1 / SHA-2 / MD4 / HMAC / Block cipher / Key size / Py / Data Encryption Standard / Crypt / Cryptography / Cryptographic hash functions / Hashing

    Microsoft PowerPoint - preneel_abudhabiv2.ppt

    Add to Reading List

    Source URL: homes.esat.kuleuven.be

    Language: English - Date: 2011-12-11 02:59:17
    578Perl / Cross-platform software / CGI.pm / Form / Outline of Perl / Software / Computing / Scripting languages

    CGI Programming with Perl #!/usr/bin/perl # It Came From the Crypt! $q=

    Add to Reading List

    Source URL: perltraining.com.au

    Language: English - Date: 2005-08-01 23:49:40
    579Crypt / Phishing / Access control / Password strength / Password cracking / Password / Computer security / Security

    Using Passwords Safely Rik Farrow Thursday, March 17, 2011 Passwords

    Add to Reading List

    Source URL: rikfarrow.com

    Language: English - Date: 2011-03-17 18:17:39
    580Password strength / Password / Salt / John the Ripper / Rainbow table / Passphrase / Crypt / OTPW / Random password generator / Cryptography / Security / Computer security

    The Security of Modern Password Expiration: An Algorithmic Framework and Empirical Analysis Yinqian Zhang Fabian Monrose

    Add to Reading List

    Source URL: cs.unc.edu

    Language: English - Date: 2010-07-30 10:55:54
    UPDATE