Crypt

Results: 686



#Item
111

The A to Z GUIDE to the ZK-Crypt AN ANNOTATED GLOSSARY & SUPPORT REFERENCE ZK-CRYPT–THE 8K GATE SYMMETRIC PERIPHERAL FOR BEST OF BREED SINGLE STEP DUAL TRACK FEEDBACK 32 BIT STREAM CIPHERING

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2008-02-15 09:35:42
    112

    The ZK-Crypt Noise Generator Design Parameter Emulator A GUIDE TO OPERATING THE ZK-CRYPT QUADRUPLE OUTPUT RANDOM AND DETERMINISTIC NOISE GENERATOR EMULATOR FOR ESTABLISHING FINAL DESIGN CONFIGURATIONS FOR BIS AIS 31 COMP

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2008-02-15 09:35:45
      113

      CRYPT(3) Library functions CRYPT(3)

      Add to Reading List

      Source URL: distro.ibiblio.org

      Language: English - Date: 2009-09-07 19:42:15
        114

        An Expanded ZK-Crypt III Security Analysis SECURITY ANALYSIS OF THE ZK-CRYPT with reference to Phase II submission includes 3rd Party Analyses, New Proofs and Observations concerning: Dual Track Orthogonal Feedback in a

        Add to Reading List

        Source URL: www.ecrypt.eu.org

        Language: English - Date: 2008-02-15 09:35:28
          115

          Deobfuscation and beyond Vasily Bukasov and Dmitry Schelkunov https://re-crypt.com

          Add to Reading List

          Source URL: 2014.zeronights.org

          Language: English - Date: 2014-11-18 09:34:39
            116

            Breaking UNIX crypt() on the  PlayStation 3     Marc Bevand

            Add to Reading List

            Source URL: download.openwall.net

            Language: English - Date: 2010-05-02 19:12:52
              117PHP programming language / Password / Crypt / PhpMyAdmin / Cryptographic software / Software / Cross-platform software / MySQL

              Computer Science 75 Fall 2009 Scribe Notes Lecture 6: October 26, 2009 Andrew Sellergren

              Add to Reading List

              Source URL: cdn.cs75.net

              Language: English - Date: 2012-08-23 00:55:02
              118Password / Key management / Crypt / John the Ripper / Key derivation function / Brute-force attack / Passwd / Botnet / OTPW / Cryptography / Computer security / Security

              Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mc

              Add to Reading List

              Source URL: nsrc.cse.psu.edu

              Language: English - Date: 2015-04-16 15:07:31
              119Hashing / MD5 / HMAC / SHA-2 / Collision attack / SHA-1 / Hash function / Crypt / Merkle–Damgård construction / Error detection and correction / Cryptographic hash functions / Cryptography

              EECS 388 Intro to Computer Security September 5, 2014 Project 1: Attacking Cryptographic Hashes

              Add to Reading List

              Source URL: www.eecs.umich.edu

              Language: English - Date: 2014-12-24 15:06:41
              120Collision attack / X.509 / Arjen Lenstra / Transport Layer Security / Alexander Sotirov / Crypt / Cryptography / Cryptographic protocols / MD5

              Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate Marc Stevens Alexander Sotirov Jacob Appelbaum

              Add to Reading List

              Source URL: www.iacr.org

              Language: English - Date: 2009-09-22 18:23:04
              UPDATE