MD5

Results: 480



#Item
151OpenBSD’s New Suspend and Resume Framework Paul Irofti March 11, 2011 Abstract

OpenBSD’s New Suspend and Resume Framework Paul Irofti March 11, 2011 Abstract

Add to Reading List

Source URL: openbsd.md5.com.ar

Language: English - Date: 2011-10-10 05:29:34
152New trends in mandoc: Enhancing the modern toolbox for the classic documentation formats Ingo Schwarze <> BSDCan 2014, May 17, Ottawa

New trends in mandoc: Enhancing the modern toolbox for the classic documentation formats Ingo Schwarze <> BSDCan 2014, May 17, Ottawa

Add to Reading List

Source URL: openbsd.md5.com.ar

Language: English - Date: 2014-05-17 14:38:48
153PROTECTING STORED CARDHOLDER DATA (AN UNOFFICIAL SUPPLEMENT TO PCI DSS V3.0) Rob Chahin — rob[dot]chahin[at]nccgroup[dot]com iSEC Partners, Inc 123 Mission Street, Suite 1020

PROTECTING STORED CARDHOLDER DATA (AN UNOFFICIAL SUPPLEMENT TO PCI DSS V3.0) Rob Chahin — rob[dot]chahin[at]nccgroup[dot]com iSEC Partners, Inc 123 Mission Street, Suite 1020

Add to Reading List

Source URL: www.isecpartners.com

Language: English - Date: 2015-02-18 09:34:54
154Appears in Advances in Cryptology { Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Springer-Verlag, Y. Desmedt, ed., 1994. Incremental Cryptography: The Case of Hashing and Signing 

Appears in Advances in Cryptology { Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Springer-Verlag, Y. Desmedt, ed., 1994. Incremental Cryptography: The Case of Hashing and Signing 

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1998-07-30 11:58:58
155Taming OpenBSD Network Stack Dragons  Martin Pieuchot  EuroBSDcon, Sofia

Taming OpenBSD Network Stack Dragons Martin Pieuchot EuroBSDcon, Sofia

Add to Reading List

Source URL: openbsd.md5.com.ar

Language: English - Date: 2014-09-27 08:10:31
156Introduction  Device Configuration Activate Functions

Introduction Device Configuration Activate Functions

Add to Reading List

Source URL: openbsd.md5.com.ar

Language: English - Date: 2011-10-10 05:29:34
157Dynamic SHA Zijie Xu E-mail:  Abstract. In this paper I describe the construction of Dynamic SHA family of cryptographic hash functions. They are built with design

Dynamic SHA Zijie Xu E-mail: Abstract. In this paper I describe the construction of Dynamic SHA family of cryptographic hash functions. They are built with design

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-20 08:25:40
158Finding MD5 Collisions – a Toy For a Notebook Vlastimil Klíma 1 Prague, Czech Republic http://cryptography.hyperlink.cz  March 5, 2005

Finding MD5 Collisions – a Toy For a Notebook Vlastimil Klíma 1 Prague, Czech Republic http://cryptography.hyperlink.cz March 5, 2005

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-08 12:38:58
1591  MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya

1 MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-06 19:52:41
160Visio-Ti-SSL-main (v1.0).vsd

Visio-Ti-SSL-main (v1.0).vsd

Add to Reading List

Source URL: www.tech-invite.com

Language: English - Date: 2014-03-03 07:44:09