Crypt

Results: 686



#Item
671Password / Cryptographic software / Draw a Secret / Crypt / S/KEY / Recall / Security / Computer security / Cryptography

PDF Document

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2008-03-18 13:38:14
672Crypt / Password / PBKDF2 / Salt / Key / Passphrase / Key stretching / Password-based cryptography / Cryptography / Key management / Key derivation function

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:41:01
673Hashing / Message authentication codes / HMAC / SHA-2 / Preimage attack / SHA-1 / Collision resistance / Hash function / Crypt / Cryptography / Cryptographic hash functions / Error detection and correction

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-27 10:06:47
674NIST hash function competition / SHA-2 / SHA-1 / Hashing / Skein / Secure Hash Standard / Crypt / NaSHA / Error detection and correction / Cryptographic hash functions / Cryptography

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-11-18 10:39:03
675RIPEMD / SHA-2 / MD5 / SHA-1 / Hash function / Crypt / MD4 / HMAC / Cryptographic hash functions / Error detection and correction / Cryptography

PDF Document

Add to Reading List

Source URL: fsjournal.cpu.edu.tw

- Date: 2013-07-11 05:51:47
676Kaminaljuyu / Crypt / Americas / Funerary art / Archaeology / Subterranea / Tomb

PDF Document

Add to Reading List

Source URL: homepage.univie.ac.at

Language: English - Date: 2010-07-13 13:41:05
677Computer security / MD5 / Cryptographic hash functions / Search algorithms / Archive formats / Crypt / GNU Privacy Guard / Zip / MD4 / Cryptography / Computing / Hashing

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-02 07:14:35
678Hashing / SHA-2 / SHA-1 / NIST hash function competition / RIPEMD / MD4 / Crypt / Cryptographic software / Hash list / Cryptographic hash functions / Error detection and correction / Cryptography

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-07-06 15:23:14
679Hash function / SHA-1 / Preimage attack / MD5 / NIST hash function competition / MD4 / Crypt / Cryptographic hash functions / Cryptography / SHA-2

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-12-11 06:48:31
680Cryptographic hash functions / Hash function / Advanced Encryption Standard / HMAC / Crypt / Algorithm / ZPAQ / HC-256 / Cryptography / Hashing / Error detection and correction

PDF Document

Add to Reading List

Source URL: ehash.iaik.tugraz.at

Language: English - Date: 2008-11-04 08:21:38
UPDATE