The Crypt

Results: 208



#Item
31Cryptography / Hashing / Search algorithms / Cryptographic hash functions / Hash function / Hash table / RSA / Crypt / Block cipher / Universal hashing / Scrypt

STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

Add to Reading List

Source URL: www.daemonology.net

Language: English - Date: 2009-06-11 07:29:01
32Software engineering / Software / Computer programming / Cross-platform software / Perl / High-level programming languages / Scripting languages / CGI.pm / Common Gateway Interface / Outline of Perl / Perl 6

CGI Programming with Perl #!/usr/bin/perl # It Came From the Crypt! $q=

Add to Reading List

Source URL: www.perltraining.com.au

Language: English - Date: 2005-08-01 23:49:40
33Cryptography / Computer access control / Computer security / Password / Security / Brute-force attack / Hashcat / John the Ripper / Crypt / Guessing / Security hacker / Password fatigue

Measuring Real-World Accuracies and Biases in Modeling Password Guessability Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek† , Willi

Add to Reading List

Source URL: www.blaseur.com

Language: English - Date: 2015-08-12 14:36:57
34Cryptography / Stream ciphers / Cryptographic hash functions / Message authentication codes / VEST / A5/1 / Data Encryption Standard / Block cipher modes of operation / Confusion and diffusion / Crypt / Rabbit / Key size

The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:18:56
35Cryptographic hash function / Crypt / Cyberwarfare / Computer security / Security / Cryptography / Public-key cryptography / File system

CS140 Operating Systems and Systems Programming Final Exam December 12, 2005 Name: (please print)______________________________ In recognition of and in the spirit of the Stanford University Honor Code, I certify

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-12-29 17:31:12
36Password / Cryptographic software / Portable Document Format / Crypt / Password strength / Password cracking / Security / Computer security / Computing

Keeping Track of Your Passwords By Paul Kiesel of Kiesel + Larson Passwords. Our lives are flooded with passwords. One of the banes of our existence in 2013 is the need to remember — if you are following the rules —

Add to Reading List

Source URL: www.kbla.com

Language: English - Date: 2014-07-09 20:41:56
37

N E W S L E T T E R F E B RUARY 2015 All the events below are held at St. Peter’s Church Crypt, at the junction of De Beauvoir Road and Northchurch Terrace

Add to Reading List

Source URL: www.debeauvoir.org.uk

- Date: 2015-02-06 17:54:43
    38

    Appendices Appendix A: AIS 31 type Report for the ZK-Crypt Noise Generator in Deterministic Mode Appendix B: Interacting Blocks in the ZK-Crypt Dual Track FB Circuits – [1S] Appendix C: Interacting Random Controller, D

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2008-02-15 09:35:38
      39

      ZKZK-Crypt Dual Track FB Circuit & Concept Drawings EXPLICIT CIRCUIT DIAGRAMS FOR THE COMBINATION ZK-CRYPT 8K GATE STREAM CIPHER [SCE], DATA AUTHENTICATER [MAC], TRNG WITH CIRCUITS, BASIC FLOW CHARTS, AND HOST INTERFACE

      Add to Reading List

      Source URL: www.ecrypt.eu.org

      Language: English - Date: 2008-02-15 09:35:33
        UPDATE