Crypt

Results: 686



#Item
581Hashing / Search algorithms / NIST hash function competition / Keccak / Hash function / Crypt / VEST / GOST / Tabulation hashing / Cryptography / Cryptographic hash functions / Error detection and correction

Note on K parameters and usage The K sponge function family is characterized by three parameters: the bitrate r, the capacity c (where r + c is the width of the underlying permutation) and

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:42
582Password / Rainbow table / Portable Document Format / Dictionary attack / Crypt / Adobe Acrobat / Password manager / Password strength / Software / Computing / Cryptography

Unlocking PDF guaranteed password recovery for Adobe Acrobat Copyright (c[removed]ElcomSoft Co.Ltd. Contents

Add to Reading List

Source URL: www.elcomsoft.com

Language: English - Date: 2014-01-15 02:17:30
583Identity management / Cryptographic software / Password manager / Password / Salt / Random password generator / John the Ripper / Crypt / Password strength / Security / Computer security / Cryptography

Kamouflage: Loss-Resistant Password Management Hristo Bojinov1 , Elie Bursztein1 , Xavier Boyen2 , and Dan Boneh1 1 2

Add to Reading List

Source URL: bojinov.org

Language: English - Date: 2010-06-30 01:55:11
584Water conservation / Environment / Organic gardening / Mulch / Pavements / Soil test / Root / Soil / Tropical agriculture / Land management / Agriculture / Sustainable gardening

A Homeowner’s Guide to Improving   Resilience of Oak Trees to Forest Pests Landscape as well as forest trees are susceptible to a variety of forest pests. Most recently this has included a new pest, the crypt gall

Add to Reading List

Source URL: www.nbnerr.org

Language: English - Date: 2014-05-04 17:39:48
585Password / Passphrase / Password manager / Random password generator / Crypt / Password policy / Security / Computer security / Cryptography

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 3 Passwords

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-24 12:29:57
586Cryptographic hash functions / Keccak / Skein / JH / Grøstl / SHA-1 / SHA-2 / Advanced Encryption Standard / Crypt / Error detection and correction / NIST hash function competition / Cryptography

SHA-3 Conference, March 2012, Evaluation of Compact FPGA Implementations for All SHA-3 Finalists

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:04:20
587Keccak / Cryptographic hash function / JH / Grøstl / BLAKE / Block cipher / Crypt / Skein / ICE / NIST hash function competition / Error detection and correction / Cryptography

Microsoft Word - SHA3_3rdCC_Submission_Paper_Kavun_Yalcin.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:11:44
588NIST hash function competition / SHA-2 / Keccak / Crypt / SHA-1 / Cryptographic hash functions / Error detection and correction / Cryptography

SHA[removed]Workshop Call for Papers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-13 08:24:21
589Skipjack / Crypt / Blowfish / SHA-2 / Feistel cipher / Stream cipher / Cryptography / Cryptographic software / National Security Agency

QDBS GPS Tracking Integration

Add to Reading List

Source URL: www.thought.net

Language: English - Date: 2010-12-18 00:32:50
590Cryptographic software / Password / Security Accounts Manager / Cryptographic hash functions / Salt / Challenge-response authentication / Shadow password / Crypt / S/KEY / Cryptography / Computer security / Security

On NT Password Security By: Jos Visser This article is (c) Copyright 1997 Open Solution Providers. It may be referred to or reproduced in full only with full retention of this copyright message. For more information on t

Add to Reading List

Source URL: www.josvisser.nl

Language: English - Date: 2004-10-07 03:31:00
UPDATE