21 | Add to Reading ListSource URL: www.istorage-uk.comLanguage: English - Date: 2013-10-17 12:30:54
|
---|
22 | |
---|
23 | Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware Alex Biryukov and Johann Großsch¨adl University of Luxembourg Laboratory of Algorithmics, Cryptology and Security (LACS) 6, rue Richard Coudenhove-KAdd to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2011-12-30 14:28:01
|
---|
24 | Appears in Proceedings: IEEE International Conference on Field-Programmable Technology – ICFPT 2007, IEEE, pp. 169–176, ISBN7, 2008. Dynamic Intellectual Property Protection for Reconfigurable DeviceAdd to Reading ListSource URL: www.bmoeller.deLanguage: English - Date: 2008-06-04 18:22:14
|
---|
25 | Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Trent Jaeger Systems and Internet Infrastructure SecuritAdd to Reading ListSource URL: www.enck.orgLanguage: English |
---|
26 | Test your defenses more efficiently Rapid7 Metasploit Express helps penetration testers conduct assessments with Metasploit Express your opponents’ moves helps you more efficiently by accelerating common Knowing betterAdd to Reading ListSource URL: www.rapid7.comLanguage: English - Date: 2014-08-27 14:54:18
|
---|
27 | Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware Katja Malvoni [removed] University of Zagreb, CroatiaAdd to Reading ListSource URL: www.openwall.comLanguage: English - Date: 2014-07-23 00:08:16
|
---|
28 | Proc. HotSec ’07 Do Strong Web Passwords Accomplish Anything? Dinei Florencio,Add to Reading ListSource URL: research.microsoft.comLanguage: English - Date: 2008-11-29 12:03:58
|
---|
29 | scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICsAdd to Reading ListSource URL: www.bsdcan.orgLanguage: English - Date: 2015-01-21 18:21:31
|
---|
30 | About AES – Advanced Encryption Standard A short introduction[removed]Copyright 2007 Svante Seleborg Axantum Software AB A short introduction to AES, the most common algorithm for current implementations of informatAdd to Reading ListSource URL: www.axantum.comLanguage: English - Date: 2014-05-04 18:08:46
|
---|