Brute-force attack

Results: 59



#Item
41Cryptanalysis with a cost-optimized FPGA cluster Jan Pelzl, Horst Görtz Institute for IT-Security, Germany  UCLA IPAM Workshop IV

Cryptanalysis with a cost-optimized FPGA cluster Jan Pelzl, Horst Görtz Institute for IT-Security, Germany UCLA IPAM Workshop IV

Add to Reading List

Source URL: www.copacobana.org

Language: English - Date: 2006-12-06 10:54:32
42Motodev_Enterprise_Logo-Red-Black

Motodev_Enterprise_Logo-Red-Black

Add to Reading List

Source URL: afu.com

Language: English - Date: 2013-03-29 15:25:36
43Motodev_Enterprise_Logo-Red-Black

Motodev_Enterprise_Logo-Red-Black

Add to Reading List

Source URL: www.afu.com

Language: English - Date: 2013-03-29 15:25:36
44Creating a secure web application through the implementation of password and plaintext encryptions Nisarga Patel Mentored by Mr. Wing Young  Introduction

Creating a secure web application through the implementation of password and plaintext encryptions Nisarga Patel Mentored by Mr. Wing Young Introduction

Add to Reading List

Source URL: www.scienceandmathacademy.com

Language: English - Date: 2013-06-10 13:55:15
451 of 2  http://www1.distributed.net/des/release-desiii.txt

1 of 2 http://www1.distributed.net/des/release-desiii.txt

Add to Reading List

Source URL: www.distributed.net

Language: English - Date: 2009-08-11 20:17:08
46TCSI[removed]..16

TCSI[removed]..16

Add to Reading List

Source URL: www.sciengines.com

Language: English - Date: 2009-08-11 09:06:39
47ed[removed]Cipher Machines & Cryptology © [removed]D. Rijmenants

ed[removed]Cipher Machines & Cryptology © [removed]D. Rijmenants

Add to Reading List

Source URL: users.telenet.be

Language: English - Date: 2013-08-25 06:00:09
48Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security A Report by an Ad Hoc Group of

Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security A Report by an Ad Hoc Group of

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2001-08-05 13:50:14
49scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2011-10-27 15:49:52
50Key Lengths Contribution to The Handbook of Information Security

Key Lengths Contribution to The Handbook of Information Security

Add to Reading List

Source URL: www.keylength.com

Language: English - Date: 2013-02-26 03:11:08