Crypt

Results: 686



#Item
641SHA-1 / MD4 / Collision attack / Padding / Hash function / Crypt / HAVAL / Cryptographic hash functions / Cryptography / MD5

How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan[removed], China

Add to Reading List

Source URL: www.infosec.sdu.edu.cn

Language: English - Date: 2008-01-14 02:29:28
642Phenolic compounds in wine / Hydroxycinnamic acids / Anthocyanin / Antioxidant / Colon / Aberrant crypt foci / Colorectal cancer / Glutathione / Carcinogenesis / Medicine / Oncology / Biology

Journal of Stress Physiology & Biochemistry, Vol. 7 No[removed], pp[removed]ISSN[removed]Original Text Copyright © 2011 by Gupta, Mittal, Jha and Kumar

Add to Reading List

Source URL: www.jspb.ru

Language: English - Date: 2011-11-14 04:31:56
643ICE / Advanced Encryption Standard / Integral cryptanalysis / International Data Encryption Algorithm / CRYPTREC / SHARK / Crypt / Blowfish / Cryptography / Block ciphers / Hierocrypt

1 Improved SQUARE Attacks Against

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
644Brute-force attack / Encryption / Crypt / Cyberwarfare / Computer security / Security / Cryptography / Common Scrambling Algorithm / DVB

On the Security of Digital Video Broadcast Encryption Markus Diett

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2010-04-20 22:07:08
645Password / Salt / Cryptographic software / Crypt / Phishing / Security token / Key derivation function / Random password generator / Password manager / Cryptography / Security / Computer security

PDF Document

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-09-26 01:52:54
646Key management / Computing / Password / Passphrase / Hash function / Control key / ASCII art / Crypt / Unicode / Cryptography / Character encoding / OSI protocols

Microsoft Word - manual_2DKey_2.0.doc

Add to Reading List

Source URL: www.xpreeli.com

Language: English - Date: 2008-09-23 06:38:01
647Caesar cipher / Cipher / Crypt / International Data Encryption Algorithm / Advanced Encryption Standard / Encryption / GNU Privacy Guard / SAFER / Cryptography / Block ciphers / ROT13

PDF Document

Add to Reading List

Source URL: www.pruefziffernberechnung.de

Language: English - Date: 2004-10-15 14:53:54
648Password / Salt / SQL injection / Cryptographic hash function / Cross-site scripting / MD5 / Crypt / Key derivation function / Cryptography / Cyberwarfare / Computer security

PDF Document

Add to Reading List

Source URL: lasecwww.epfl.ch

Language: English - Date: 2009-11-18 09:27:21
649Public-key cryptography / Power analysis / Timing attack / Symmetric-key algorithm / Hamming weight / Triple DES / Crypt / RSA / SHA-1 / Cryptography / Data Encryption Standard / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: www.cryptography.com

Language: English - Date: 2010-04-23 16:52:23
650NIST hash function competition / Grøstl / SHA-1 / Hash function / MD5 / Advanced Encryption Standard / Crypt / Collision resistance / MD4 / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
UPDATE