Crypt

Results: 686



#Item
611NIST hash function competition / Hashing / Message authentication codes / Keccak / HMAC / Hash function / Crypt / ICE / VEST / Error detection and correction / Cryptography / Cryptographic hash functions

The K SHA-3 submission

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
612Password / Salt / Shadow password / Crypt / Cryptographic software / Password cracking / Passwd / Password strength / System software / Cryptography / Computer security

A Simple Scheme to Make Passwords Based on One-Way Functions Much Harder to Crack Udi Manber1

Add to Reading List

Source URL: webglimpse.net

Language: English - Date: 2002-10-24 20:55:09
613Flavonols / Aberrant crypt foci / Genetics / Colorectal cancer / Polyp / Myricetin / Beta-catenin / Colon / Cancer / Medicine / Biology / Pathology

Preventive Effects of Myricitrin in the Rat Colon RESEARCH COMMUNICATION

Add to Reading List

Source URL: www.apocpcontrol.org

Language: English - Date: 2012-07-04 20:22:25
614Computing / Error detection and correction / Search algorithms / Hash function / SHA-2 / Hash list / Hash table / Crypt / Rsync / Cryptographic hash functions / Cryptography / Hashing

digital investigation 3S[removed]S91–S97 available at www.sciencedirect.com

Add to Reading List

Source URL: dfrws.org

Language: English - Date: 2007-03-18 21:36:24
615Device mapper / System software / Logical Volume Manager / Dm-crypt / Multipath I/O / Device file / Data striping / Logical volume management / Ioctl / Computing / Computer storage / Computer architecture

Device mapper (kernel part of LVM2 volume management)

Add to Reading List

Source URL: mbroz.fedorapeople.org

Language: English - Date: 2008-04-29 08:11:12
616Hashing / Padding / NIST hash function competition / Hash function / Crypt / Advanced Encryption Standard / Collision resistance / Merkle–Damgård construction / HAS-V / Cryptography / Cryptographic hash functions / Error detection and correction

Orange Labs Issy-les-Moulineaux, France

Add to Reading List

Source URL: crypto.rd.francetelecom.com

Language: English - Date: 2010-08-14 12:14:45
617Cipher / Algorithm / Triple DES / MAD / Permutation / Crypt / Cryptography / Data Encryption Standard / Block cipher modes of operation

NIST Special Publication[removed], Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-10 13:37:56
618Building materials / Masonry / Artisans / Stone / Stonemasonry / Chisel / Sagrada Família / Prefabrication / Antoni Gaudí / Architecture / Construction / Visual arts

CONSTRUCTION OF THE CRYPT AND THE APSE, THE NATIVITY AND PASSION FAÇADES The crypt

Add to Reading List

Source URL: www.sagradafamilia.cat

Language: English - Date: 2012-03-07 08:18:37
619SHA-1 / MD5 / Collision attack / MD4 / SHA-2 / Cryptanalysis / Padding / Crypt / Tiger / Cryptography / Cryptographic hash functions / Hashing

Counter-cryptanalysis Marc Stevens CWI, Amsterdam, The Netherlands

Add to Reading List

Source URL: marc-stevens.nl

Language: English - Date: 2013-06-08 07:57:19
620Initialization vector / Cipher / Py / Rabbit / Crypt / MMH-Badger MAC / Cryptography / Stream ciphers / Block cipher modes of operation

Rabbit Stream Cipher, Algorithm Specification May 12, 2005

Add to Reading List

Source URL: www.cryptico.com

Language: English - Date: 2011-07-07 16:04:52
UPDATE