Crypt

Results: 686



#Item
631Password / Rainbow table / Salt / One-time password / Cryptographic hash function / Crypt / Security token / Passphrase / Two-factor authentication / Security / Computer security / Cryptography

K:Journal ปีที่ 8 เล่มที่ 2

Add to Reading List

Source URL: suanpalm3.kmutnb.ac.th

Language: English - Date: 2013-01-28 01:59:46
632Provably secure cryptographic hash function / Preimage attack / Universal one-way hash function / Hash function / Collision resistance / SHA-1 / Rainbow table / Crypt / Hash list / Cryptographic hash functions / Cryptography / Error detection and correction

Provably Secure Cryptographic Hash Functions

Add to Reading List

Source URL: web.maths.unsw.edu.au

Language: English - Date: 2006-12-20 22:26:42
633Password / PBKDF2 / Brute-force attack / Bcrypt / Crypt / Key stretching / Rainbow table / Cryptography / Key management / Key derivation function

scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2011-10-27 15:49:52
634Data deduplication / Data management / Steganographic file system / Crypt / Freenet / Backup / Public-key cryptography / Key size / Secure communication / Cryptography / Disk file systems / Data compression

Secure Data Deduplication Mark W. Storer Kevin Greenan Darrell D. E. Long Ethan L. Miller Storage Systems Research Center

Add to Reading List

Source URL: www.ssrc.ucsc.edu

Language: English - Date: 2013-09-11 13:26:16
635Whirlpool / Crypt / Hash function / Cryptographic hash functions / Cryptography / Error detection and correction

Microsoft Word - 3. High-Speed Parallel Architecture of the Whirlpool Hash Function

Add to Reading List

Source URL: www.sersc.org

Language: English - Date: 2009-07-31 02:54:04
636Password / Salt / Crypt / Password strength / Password policy / Security / Cryptography / Computer security

Password Security: A Case History Robert Morris Ken Thompson

Add to Reading List

Source URL: wolfram.schneider.org

Language: English - Date: 2012-01-08 15:19:27
637Key schedule / Crypt / Slide attack / Differential cryptanalysis / Cryptography / Blowfish / Weak key

A New Class of Weak Keys for Blowfish Orhun Kara and Cevat Manap ¨ ITAK

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-07-29 02:01:14
638Cryptography / Identity management / Password policy / Password / Data security / Passphrase / Single sign-on / Crypt / Information security / Security / Computer security / Access control

NIST SP[removed], Guide to Enterprise Password Management (DRAFT)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-25 15:16:48
639Cryptography / MS-CHAP / Point-to-Point Tunneling Protocol / Password / Challenge-response authentication / Authentication protocol / Crypt / LM hash / NTLM / Computing / Computer security / Internet protocols

Exploiting known security holes in Microsoft’s PPTP Authentication Extensions (MS-CHAPv2) Jochen Eisinger

Add to Reading List

Source URL: penguin-breeder.org

Language: English - Date: 2003-02-21 09:40:07
640Espionage / Search algorithms / Hashing / Rainbow table / Password / John the Ripper / LM hash / Salt / Crypt / Cryptography / Cryptographic hash functions / Computer security

doi:[removed]j.diin[removed]

Add to Reading List

Source URL: dfrws.org

Language: English - Date: 2009-08-16 16:22:06
UPDATE