Crypt

Results: 686



#Item
591Christianity / Bourges Cathedral / Rood / Bourges / Crypt / Nave / Church architecture / Architecture / Architectural history

identité pour document de visite

Add to Reading List

Source URL: www.monuments-nationaux.fr

Language: English - Date: 2009-09-11 10:30:14
592Password / Cryptographic software / Cryptographic hash functions / Crypt / Salt / SQL injection / Brute-force attack / SHA-2 / Bcrypt / Cryptography / Computer security / Security

Creating a secure web application through the implementation of password and plaintext encryptions Nisarga Patel Mentored by Mr. Wing Young Introduction

Add to Reading List

Source URL: www.scienceandmathacademy.com

Language: English - Date: 2013-06-10 13:55:15
593Advanced Encryption Standard / Grøstl / NIST hash function competition / Whirlpool / Field-programmable gate array / AES implementations / Hash function / Crypt / Xilinx / Cryptography / Cryptographic hash functions / Error detection and correction

On Optimized FPGA Implementations of the SHA-3 Candidate Grøstl? Bernhard Jungk, Steffen Reith, and J¨ urgen Apfelbeck Fachhochschule Wiesbaden University of Applied Sciences {jungk|reith}@informatik.fh-wiesbaden.de

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-05-12 08:20:15
594Passphrase / Computer network security / Computer security / Crypt / Security / Cryptography / Password

SNAS Beta System Rules of Behavior The Office of Management and Budget (OMB) Circular A-130, Appendix III, Security of Federal Automated Information Resources requires that "Rules of Behavior" be established for each gen

Add to Reading List

Source URL: msp.gsfc.nasa.gov

Language: English - Date: 2009-03-06 09:49:05
595Hashing / Collision attack / Preimage attack / MD5 / SHA-2 / Shadow password / HMAC / SHA-1 / Crypt / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft PowerPoint - PracticalImpact_talk4

Add to Reading List

Source URL: random.mat.sbg.ac.at

Language: English - Date: 2010-06-09 05:16:35
596Cryptographic software / Cryptographic hash functions / Password / Keychain / KeePass / Crypt / LastPass Password Manager / Passphrase / PBKDF2 / Software / Cryptography / Computer security

Programming Assignment 2 Winter 2014 CS 255: Intro to Cryptography Due Feb. 21, 11:59pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-02-07 16:58:58
597Cryptographic hash functions / Computing / Computer programming / Hash function / Crypt / Hash chain / JavaScript / Hash table / Cryptography / Hashing / Search algorithms

Programming Assignment 1 Winter 2014 CS 255: Intro to Cryptography Due Jan[removed]:59pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-01-13 17:00:26
598

Para qué XP_CRYPT y SQL Shield? Desde la Perspectiva del Gerente de Proyectos. PARTE I: DEFINICIÓN DE LA NECESIDAD. Dónde falla la Protección de SQL

Add to Reading List

Source URL: www.xpcrypt.com

Language: Spanish - Date: 2004-11-02 16:29:19
    599

    なぜ XP_CRYPT & SQL Shield を選ぶのか? ぶのか? プロジェクトマネージャーの

    Add to Reading List

    Source URL: www.xpcrypt.com

    Language: Japanese - Date: 2004-11-02 16:31:17
      600IBM software / REXX / Crypt / Software / Computing / Cross-platform software

      Rexx/EEC Reference Version 1.0 Copyright (C) 2008 Mark Hessling

      Add to Reading List

      Source URL: rexxeec.sourceforge.net

      Language: English - Date: 2013-05-15 02:05:00
      UPDATE