The Crypt

Results: 208



#Item
41

For Immediate Release: Contact Shooting Gallery – Justin Giarla Shooting Gallery Presents: Bedtime Stories: From the Crib to the Crypt

Add to Reading List

Source URL: www.shootinggallerysf.com

Language: English - Date: 2012-02-22 16:14:15
    42

    The ZK-Crypt III Algorithm Specification THE ZK-CRYPT STREAM CIPHER & DATA AUTHENTICATION ALGORITHM WITH IMPLEMENTATIONS AN ARCHIVED PROFILE II CANDIDATE FOR THE eSTREAM CONTEST INCLUDES THE DUAL TRACK FEEDBACK STRATEGY

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2008-02-15 09:35:25
      43

      AN ARCHAEOLOGICAL SITE The archaeological site of the Marguerite Bourgeoys Museum, reached through the crypt, provides a fascinating experience for visitors. This site, one of the oldest Catholic sites in the Americas, s

      Add to Reading List

      Source URL: www.marguerite-bourgeoys.com

      Language: English - Date: 2009-12-04 12:11:49
        44

        The Crypt in Ely Place, off Holborn Circus, has been described as one of London’s “Most Magical” Party Venues. In an atmosphere redolent of times gone by, the Crypt provides a unique combination of truly historic a

        Add to Reading List

        Source URL: www.bleedingheart.co.uk

        Language: English - Date: 2015-04-01 05:25:56
          45

          The A to Z GUIDE to the ZK-Crypt AN ANNOTATED GLOSSARY & SUPPORT REFERENCE ZK-CRYPT–THE 8K GATE SYMMETRIC PERIPHERAL FOR BEST OF BREED SINGLE STEP DUAL TRACK FEEDBACK 32 BIT STREAM CIPHERING

          Add to Reading List

          Source URL: www.ecrypt.eu.org

          Language: English - Date: 2008-02-15 09:35:42
            46

            The ZK-Crypt Noise Generator Design Parameter Emulator A GUIDE TO OPERATING THE ZK-CRYPT QUADRUPLE OUTPUT RANDOM AND DETERMINISTIC NOISE GENERATOR EMULATOR FOR ESTABLISHING FINAL DESIGN CONFIGURATIONS FOR BIS AIS 31 COMP

            Add to Reading List

            Source URL: www.ecrypt.eu.org

            Language: English - Date: 2008-02-15 09:35:45
              47

              An Expanded ZK-Crypt III Security Analysis SECURITY ANALYSIS OF THE ZK-CRYPT with reference to Phase II submission includes 3rd Party Analyses, New Proofs and Observations concerning: Dual Track Orthogonal Feedback in a

              Add to Reading List

              Source URL: www.ecrypt.eu.org

              Language: English - Date: 2008-02-15 09:35:28
                48

                Breaking UNIX crypt() on the  PlayStation 3     Marc Bevand

                Add to Reading List

                Source URL: download.openwall.net

                Language: English - Date: 2010-05-02 19:12:52
                  49Password / Key management / Crypt / John the Ripper / Key derivation function / Brute-force attack / Passwd / Botnet / OTPW / Cryptography / Computer security / Security

                  Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mc

                  Add to Reading List

                  Source URL: nsrc.cse.psu.edu

                  Language: English - Date: 2015-04-16 15:07:31
                  50Collision attack / X.509 / Arjen Lenstra / Transport Layer Security / Alexander Sotirov / Crypt / Cryptography / Cryptographic protocols / MD5

                  Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate Marc Stevens Alexander Sotirov Jacob Appelbaum

                  Add to Reading List

                  Source URL: www.iacr.org

                  Language: English - Date: 2009-09-22 18:23:04
                  UPDATE