The Crypt

Results: 208



#Item
131Key management / Cut /  copy /  and paste / Keychain / Crypt / Computer security / Technology / Internet privacy / GNOME Keyring / Cryptography / Passphrase / User interface techniques

PGP Command Summary for Macintosh Launching PGPKeys: in the desktop menu bar, then PGPKEYS Click on the

Add to Reading List

Source URL: imss-website.s3.amazonaws.com

Language: English - Date: 2011-10-10 17:58:54
132Technology / Software / IPhone / ITunes / Crypt / Internet privacy / Source code / In case of emergency / Mobile apps / Smartphones / Information appliances / Computing

FAQs: CodeSearch Program What is CodeSearch? CodeSearch is the Missing Children Society of Canada’s (MCSC) rapid-response program that directly engages partner organizations in the active investigation of missing child

Add to Reading List

Source URL: victimservicesalberta.com

Language: English - Date: 2014-05-23 16:08:25
133Password / Health Insurance Portability and Accountability Act / Information security / Crypt / Internet privacy / Password manager / Jumbleme / Security / Computer security / Cryptography

Privacy & Information Security 1. All data must be stored on a UNMC computer network drive or an encrypted local hard drive. Do not create electronic storage areas on the internet (i.e. cloud computing) because such stor

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2012-07-30 13:38:38
134NIST hash function competition / Authenticated encryption / Symmetric-key algorithm / Crypt / Advanced Encryption Standard / Cryptography / Cryptographic hash functions / Keccak

Tutorial on Keccak and SHA-3 by Guido Bertoni Abstract: Keccak has been selected as SHA-3 in[removed]It is a very flexible algorithm allowing to perform all the primitives of symmetric key cryptography: stream cipher, hash

Add to Reading List

Source URL: www.chesworkshop.org

Language: English - Date: 2014-07-02 15:54:48
135Cryptographic software / Disk encryption / Password / Crypt / Encrypting File System / Features new to Windows XP / Software / Microsoft Windows / System software

Security Encryption Tool and ESS Password Distribution DOP Security will encrypt user files distributed to the Agency ESS Distribution Points of Contact with CipherLock™ by Bokler Software Corp. Agency’s ESS Distri

Add to Reading List

Source URL: www.hr.wa.gov

Language: English - Date: 2012-11-09 03:45:51
136Hashing / Merkle–Damgård construction / Hash function / Collision resistance / Crypt / Block cipher / Information retrieval / Computing / Artificial intelligence / Cryptographic hash functions / Cryptography / Search algorithms

X-Sieve: CMU Sieve 2.2 Date: Tue, 13 Mar 2007 01:50:24 +0100 (CET) From: Orr Dunkelman To: hash-function@nist.gov Subject: A comment to NIST regarding the Hash function Competition X-Viru

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:58:52
137Visual arts / Time capsule / International Time Capsule Society / Crypt of Civilization / Capsule / Bayeux Tapestry / Bacterial capsule / Cornerstone / Westinghouse Time Capsules / Oglethorpe University / Human communication / Georgia

POSTERITY History of the Time Capsule John M. Hoenig, Ph.D. looks at some of the attempts to preserve the present for the future. IT WAS ALL SET. Theodore Roosevelt IV, great-grandson of US President

Add to Reading List

Source URL: www.fisheries.vims.edu

Language: English - Date: 2005-02-15 09:54:26
138Disk encryption / Microsoft Windows / Encryption software / Zip / Windows Explorer / Crypt / Utility software / Encrypting File System / EncFS / Software / System software / Cryptographic software

Pension Administration System - File Encryption Software Overview: The electronic age has brought forth many technological advances. With these advances came the need for security and tighter control on how we send info

Add to Reading List

Source URL: www.exec.gov.nl.ca

Language: English - Date: 2014-04-08 13:42:14
139Online backup services / Cryptography / Mozy / Web hosting / Cryptographic software / Crypt / Remote backup service / Advanced Encryption Standard / Encryption / Computing / Software / Cloud storage

Securing and Encrypting Mozy Cloud Backup The MozyEnterprise® advantage Simple Seamlessly manage backup, sync,

Add to Reading List

Source URL: mozy.com

Language: English
140Keccak / Hashing / Block ciphers / Joan Daemen / Threefish / Skein / Fugue / Bart Preneel / Crypt / Cryptography / NIST hash function competition / Cryptographic hash functions

The Second SHA-3 Candidate Conference Accepted Papers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:50:30
UPDATE