Hash functions

Results: 1148



#Item
211Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing Alex Biryukov University of Luxembourg

Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing Alex Biryukov University of Luxembourg

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-06 04:22:19
212TargetCollidingCertificatesTech

TargetCollidingCertificatesTech

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2006-10-26 18:40:33
213Hashing Algorithms: The Good, the Bad, and the Fail Steve Thomas “Sc00bz” Passwords^12 TobTu.com/passwords12

Hashing Algorithms: The Good, the Bad, and the Fail Steve Thomas “Sc00bz” Passwords^12 TobTu.com/passwords12

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-06 12:18:45
214Contents  I Table of Contents Part I Introduction

Contents I Table of Contents Part I Introduction

Add to Reading List

Source URL: www.bytefusion.com

Language: English - Date: 2007-05-31 21:17:32
215J Cryptogr Eng:5–27 DOIs13389y REGULAR PAPER  Introduction to differential power analysis

J Cryptogr Eng:5–27 DOIs13389y REGULAR PAPER Introduction to differential power analysis

Add to Reading List

Source URL: ftp.cryptography.com

Language: English - Date: 2011-10-03 19:52:55
216CIS 331 Introduction to Networks & Security February 6, 2014 Homework 2: Authentication

CIS 331 Introduction to Networks & Security February 6, 2014 Homework 2: Authentication

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-11-18 15:19:13
217Sadikhov Certification Digital Signature Verification 1. Open the certification pdf file with a related pdf opener such as adobe acrobat readerYou can find a digital signature at the bottom of the certification w

Sadikhov Certification Digital Signature Verification 1. Open the certification pdf file with a related pdf opener such as adobe acrobat readerYou can find a digital signature at the bottom of the certification w

Add to Reading List

Source URL: www.sadikhov.com

Language: English - Date: 2010-08-09 21:13:00
218CIS 331 Introduction to Networks & Security January 27, 2015 Project 1: Cryptographic Attacks

CIS 331 Introduction to Networks & Security January 27, 2015 Project 1: Cryptographic Attacks

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-02-03 14:04:06
219MD5 considered harmful today Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger Presentation by: Hamidhasan G. Ahmed

MD5 considered harmful today Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger Presentation by: Hamidhasan G. Ahmed

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-09-26 13:48:46
220Perl versiondocumentation - Term::ReadLine  NAME Term::ReadLine - Perl interface to various readline packages. If no real package is found, substitutes stubs instead of basic functions.

Perl versiondocumentation - Term::ReadLine NAME Term::ReadLine - Perl interface to various readline packages. If no real package is found, substitutes stubs instead of basic functions.

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:09:39