The Crypt

Results: 208



#Item
181Cemetery / Geography of the United States / Geography of Illinois / Culture / Chicago / Stanley Tigerman / Crypt

12 CHICAGO READER | JUNE 10, 2005 | SECTION ONE Architecture If It

Add to Reading List

Source URL: www.chicagoreader.com

Language: English - Date: 2009-07-16 18:34:28
182Randomness / Password / John the Ripper / Salt / Entropy / Crypt / MD5 / Password strength / Password policy / Cryptography / Computer security / Security

The science of guessing: analyzing an anonymized corpus of 70 million passwords Joseph Bonneau Computer Laboratory University of Cambridge [removed]

Add to Reading List

Source URL: www.jbonneau.com

Language: English - Date: 2014-05-03 16:10:03
183Perl / Cross-platform software / CGI.pm / Form / Outline of Perl / Software / Computing / Scripting languages

CGI Programming with Perl #!/usr/bin/perl # It Came From the Crypt! $q=

Add to Reading List

Source URL: perltraining.com.au

Language: English - Date: 2005-08-01 23:49:40
184Password strength / Password / Salt / John the Ripper / Rainbow table / Passphrase / Crypt / OTPW / Random password generator / Cryptography / Security / Computer security

The Security of Modern Password Expiration: An Algorithmic Framework and Empirical Analysis Yinqian Zhang Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2010-07-30 10:55:54
185Hashing / Search algorithms / NIST hash function competition / Keccak / Hash function / Crypt / VEST / GOST / Tabulation hashing / Cryptography / Cryptographic hash functions / Error detection and correction

Note on K parameters and usage The K sponge function family is characterized by three parameters: the bitrate r, the capacity c (where r + c is the width of the underlying permutation) and

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:42
186Identity management / Cryptographic software / Password manager / Password / Salt / Random password generator / John the Ripper / Crypt / Password strength / Security / Computer security / Cryptography

Kamouflage: Loss-Resistant Password Management Hristo Bojinov1 , Elie Bursztein1 , Xavier Boyen2 , and Dan Boneh1 1 2

Add to Reading List

Source URL: bojinov.org

Language: English - Date: 2010-06-30 01:55:11
187Water conservation / Environment / Organic gardening / Mulch / Pavements / Soil test / Root / Soil / Tropical agriculture / Land management / Agriculture / Sustainable gardening

A Homeowner’s Guide to Improving   Resilience of Oak Trees to Forest Pests Landscape as well as forest trees are susceptible to a variety of forest pests. Most recently this has included a new pest, the crypt gall

Add to Reading List

Source URL: www.nbnerr.org

Language: English - Date: 2014-05-04 17:39:48
188Password / Cryptographic software / Cryptographic hash functions / Crypt / Salt / SQL injection / Brute-force attack / SHA-2 / Bcrypt / Cryptography / Computer security / Security

Creating a secure web application through the implementation of password and plaintext encryptions Nisarga Patel Mentored by Mr. Wing Young Introduction

Add to Reading List

Source URL: www.scienceandmathacademy.com

Language: English - Date: 2013-06-10 13:55:15
189Advanced Encryption Standard / Grøstl / NIST hash function competition / Whirlpool / Field-programmable gate array / AES implementations / Hash function / Crypt / Xilinx / Cryptography / Cryptographic hash functions / Error detection and correction

On Optimized FPGA Implementations of the SHA-3 Candidate Grøstl? Bernhard Jungk, Steffen Reith, and J¨ urgen Apfelbeck Fachhochschule Wiesbaden University of Applied Sciences {jungk|reith}@informatik.fh-wiesbaden.de

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-05-12 08:20:15
190Passphrase / Computer network security / Computer security / Crypt / Security / Cryptography / Password

SNAS Beta System Rules of Behavior The Office of Management and Budget (OMB) Circular A-130, Appendix III, Security of Federal Automated Information Resources requires that "Rules of Behavior" be established for each gen

Add to Reading List

Source URL: msp.gsfc.nasa.gov

Language: English - Date: 2009-03-06 09:49:05
UPDATE