The Crypt

Results: 208



#Item
201Cryptography / Password / Passphrase / One-time password / Password manager / Crypt / Password strength / Security / Computer security / Access control

Password Policy Created by or for the SANS Institute. Feel free to modify or use for your organization. If you have a policy to contribute, please send e-mail to [removed]

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2012-05-31 20:41:18
202ID-based encryption / Certificate-based encryption / Crypt / Ciphertext / ID-based cryptography / Proxy re-encryption / Cryptography / Public-key cryptography / Electronic commerce

Certificate-Based Encryption and the Certificate Revocation Problem

Add to Reading List

Source URL: www.cis.nctu.edu.tw

Language: English - Date: 2003-06-03 09:36:43
203System administration / Computer network security / Hacking / Pass the hash / Password / Security Accounts Manager / Superuser / Crypt / Expect / Computer security / System software / Cyberwarfare

National Security Agency/Central Security Service Information  

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2013-04-18 17:40:46
204Enigma machine / Bombe / Reflector / Plugboard / Cryptanalysis / Purple / Substitution cipher / Cryptanalysis of the Enigma / Enigma rotor details / Cryptography / Rotor machines / Espionage

MowryBrochure - German Crypt. Equip1.qxd

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2009-01-13 11:15:06
205Hashing / Preimage attack / SHA-1 / MD5 / NIST hash function competition / Collision resistance / Crypt / HMAC / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions

The Hitchhiker's Guide to the SHA-3 Competition

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2012-07-04 01:21:00
206Whirlpool / Crypt / Hash function / Cryptographic hash functions / Cryptography / Error detection and correction

Microsoft Word - 3. High-Speed Parallel Architecture of the Whirlpool Hash Function

Add to Reading List

Source URL: www.sersc.org

Language: English - Date: 2009-07-31 02:54:04
207Espionage / Search algorithms / Hashing / Rainbow table / Password / John the Ripper / LM hash / Salt / Crypt / Cryptography / Cryptographic hash functions / Computer security

doi:[removed]j.diin[removed]

Add to Reading List

Source URL: dfrws.org

Language: English - Date: 2009-08-16 16:22:06
208Brute-force attack / Encryption / Crypt / Cyberwarfare / Computer security / Security / Cryptography / Common Scrambling Algorithm / DVB

On the Security of Digital Video Broadcast Encryption Markus Diett

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2010-04-20 22:07:08
UPDATE