The Crypt

Results: 208



#Item
171Search algorithms / Error detection and correction / Hash function / Crypt / Secure Hash Standard / SHA-2 / NIST hash function competition / Cryptography / Cryptographic hash functions / Hashing

mstockstill on PROD1PC70 with NOTICES Federal Register / Vol. 72, No[removed]Tuesday, January 23, [removed]Notices or through the email hotline – vietnam– texapp-monitor–[removed]. PRODUCT COVERAGE: The

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:28:18
172SHA-2 / SHA-1 / Crypt / Hash function / Transport Layer Security / Error detection and correction / Cryptographic hash functions / Cryptography

The Secure Hash Algorithm Validation System (SHAVS) Updated: May 21, 2014 Created: July 22, 2004 Lawrence E. Bassham III

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-21 09:13:37
173Cryptography / Password / Shadow password / Salt / Crypt / Passwd / Password strength / Privileged password management / Security / Computer security / System software

Coping with the Threat of Computer Security Incidents: a Primer from Prevention through Recovery

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-11 15:44:59
174Cryptographic Module Validation Program / Elliptic curve cryptography / Advanced Encryption Standard / SHA-2 / FIPS 140 / Key size / SHA-1 / Digital signature / Crypt / Cryptography / Cryptography standards / FIPS 140-2

The Cryptographic Algorithm Validation Program

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:47
175Password / SLAC National Accelerator Laboratory / Crypt / Physics / Stanford University / United States Department of Energy National Laboratories

Fax to[removed]or mail to Thomas Eriksson, SSRL,2575 Sand Hill Road, Bldg 120, Menlo Park,CA94025 SSRL/SMB Computer Account Request Form June 2007 Fill in this form and sign the security statement mentioned at the b

Add to Reading List

Source URL: www-ssrl.slac.stanford.edu

Language: English - Date: 2012-07-19 19:39:15
176Cryptography / Cryptographic software / Password / Roboform / Passphrase / KeePass / Keystroke logging / Crypt / Password strength / Security / Computer security / Software

InsighT to Security Newsletter[removed]Idaho Office of the CIO

Add to Reading List

Source URL: cio.idaho.gov

Language: English - Date: 2012-10-09 22:40:05
177National Software Reference Library / Security Content Automation Protocol / National Vulnerability Database / Dynamic-link library / Crypt / Vulnerability / Computer security / Computing / Cyberwarfare

Cyber-Infrastructure Uses for the NIST NSRL Douglas
White Disclaimer

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2009-05-20 11:51:25
178Metadata / Computer file / Information / Data / Computing / Data management / Forensic Toolkit / Crypt

Current Activities in the November 7, 2006 Project Support The NSRL project is supported by

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2006-11-06 09:17:10
179Security / System software / Password / Crypt / Computer security

Class of Works Circumvention of Software - where the encryption needs to be circumvented due to unavailability of password(s) caused by absence, death, or termination. Summary of the Argument for the Exemption Difficulty

Add to Reading List

Source URL: www.copyright.gov

Language: English - Date: 2012-05-24 14:24:47
180Computing / USB flash drive / Security token / Smart card / Operating system / Universal Serial Bus / Mac OS X / Technology / Computer hardware / ISO standards / Ubiquitous computing

plug´n´crypt plug´n´crypt ® charismathics provides easy to use and flexible identity solutions through an affordable USB token. The plug´n´crypt token combines the functionality of a secure smart card with

Add to Reading List

Source URL: www.planc.biz

Language: English - Date: 2011-01-27 05:15:05
UPDATE