The Crypt

Results: 208



#Item
71Password / Cryptographic software / Cryptography / Crypt / Password policy / KeePass / Software / Security / Computer security

Password Protection APPENDIX B PASSWORD PROTECTION The payroll system provides password protection as a standard feature. If you do not wish to implement a password, you may change one or both passwords to blanks. This

Add to Reading List

Source URL: www.datasmithpayroll.com

Language: English - Date: 2008-09-16 20:41:59
72Hashing / Hash function / SHA-2 / Key stretching / Crypt / Password / One-way compression function / Tabulation hashing / Hash table / Cryptography / Cryptographic hash functions / Search algorithms

STRICT MEMORY HARD HASHING FUNCTIONS (PRELIMINARY V0.3, SERGIO DEMIAN LERNER Abstract. We introduce the concept of strict memory hard functions. Strict memory hard functions are an extension of memory hard func

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2014-02-01 12:00:10
73Computing / Password / Remote backup service / Crypt / Encryption / Encrypting File System / FileVault / Cryptographic software / Cryptography / Computer security

White Paper Benefits of Secure Off-Site Online Backup In today’s computing environment, businesses are relying on computers to perform daily business activities as well as mission critical functions. The use of compute

Add to Reading List

Source URL: www.firstbackup.com

Language: English - Date: 2007-03-16 17:00:00
74Password / Random password generator / John the Ripper / Crypt / Phishing / OTPW / Password manager / Cryptography / Security / Computer security

On The Ecological Validity of a Password Study Sascha Fahl, Marian Harbach, Yasemin Acar, Matthew Smith Usable Security and Privacy Laboratory Leibniz University Hannover, Germany fahl, harbach, acar, -h

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-07-04 18:50:01
75Cryptographic software / System software / Instruction set architectures / Password / Crypt / John the Ripper / ARM architecture / Central processing unit / Field-programmable gate array / Software / Computer architecture / Bcrypt

Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware Katja Malvoni (kmalvoni at openwall.com)

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2014-11-11 15:42:08
76Cryptographic software / Public-key cryptography / Privacy software / Cross-platform software / GNU Privacy Guard / OpenPGP card / X.509 / Werner Koch / Crypt / Cryptography / PGP / Computer security

Using the GNU Privacy Guard VersionApril 2015 The GnuPG Project (https://gnupg.org)

Add to Reading List

Source URL: www.gnupg.org

Language: English - Date: 2015-04-11 07:28:52
77Electronics / Bcrypt / Cryptographic software / Computer architecture / Crypt / Multi-core processor / John the Ripper / Brute-force attack / Field-programmable gate array / Cryptography / Computing / GPGPU

Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware Katja Malvoni University of Zagreb, Croatia

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-05-03 17:37:18
78Cryptography / Password / Crypt / John the Ripper / Password policy / Cognitive password / Computer security / Security / Access control

Does My Password Go up to Eleven? The Impact of Password Meters on Password Selection Serge Egelman1 , Andreas Sotirakopoulos2 , Ildar Muslukhov2 , Konstantin Beznosov2 , and Cormac Herley3 1 2

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2013-04-29 12:12:39
79Cryptography / System administration / Unix / Password / Salt / Shadow password / Crypt / Password strength / Passwd / System software / Computer security / Software

‘‘Foiling the Cracker’’: A Survey of, and Improvements to, Password Security† Daniel V. Klein Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15217

Add to Reading List

Source URL: geodsoft.com

Language: English - Date: 2003-11-09 11:25:55
80Key schedule / Twofish / Block ciphers / ICE / Entropy / Key size / Fortuna / Crypt / S-box / Cryptography / Advanced Encryption Standard / Key management

Twofish Technical Report #4 Further Observations on the Key Schedule of Twofish Doug Whiting∗ John Kelsey†

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
UPDATE