Crypt

Results: 686



#Item
131Crypt of Civilization / Culture of Atlanta /  Georgia / Hearing / Time capsule / Behavior / North American Time Capsule / Alvin Lucier / Active listening / Thornwell Jacobs / Oglethorpe University / Human communication / Human behavior

A SONIC TIME CAPSULE A sound, a whole sound is not separation, a whole sound is in an order. Gertrude Stein

Add to Reading List

Source URL: ia902609.us.archive.org

Language: English - Date: 2014-01-19 05:52:43
132SHA-2 / SHA-1 / HMAC / Crypto++ / Crypt / NIST hash function competition / Tiger / HAS-160 / Cryptographic hash functions / Error detection and correction / Cryptography

Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 Tim Grembowski1, Roar Lien1, Kris Gaj1, Nghi Nguyen1, Peter Bellows2, Jaroslav Flidr2, Tom Lehman2, Brian Schott2 1Electrical

Add to Reading List

Source URL: web.archive.org

Language: English
133Cryptographic software / System software / Hashing / OpenSSL / MD5 / SHA-2 / Crypt / SHA-1 / Base64 / Cryptography / Cryptographic hash functions / Computing

Package ‘openssl’ May 11, 2015 Type Package Title Bindings to OpenSSL Version 0.4 Date

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2015-05-11 05:21:58
134System software / System administration / Password / Shadow password / Unix security / Information security / Crypt / Password strength / Password cracking / Security / Unix / Computer security

TESTBED Linux SekChek for UNIX Security Report System: Linuxwhite 9 NovemberSekChek IPS

Add to Reading List

Source URL: www.sekchek.com

Language: English - Date: 2013-11-13 07:31:42
135MD5 / Search algorithms / Collision attack / MD4 / Hash function / Merkle–Damgård construction / Preimage attack / Crypt / SHA-1 / Cryptography / Cryptographic hash functions / Hashing

An algorithm for MD5 single-block collision attack using high-performance computing cluster

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-07 01:57:01
136Cryptography / System software / Password / Encryption software / Crypt / Encrypting File System / EncFS / Cryptographic software / Software / Disk encryption

PDF Document

Add to Reading List

Source URL: dwn.tensionsoftware.com

Language: English - Date: 2014-04-24 10:24:11
137Password / Salt / Crypt / Cryptographic software / Password strength / Password manager / Security / Cryptography / Computer security

PKC 2015 – March 31st Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions Jan Camenisch, Robert R. Enderlein, Gregory Neven

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-30 09:22:20
138Password / Rotary dial / Crypt / Key / Telephony / Cryptography / Public-key cryptography

Public Key Encryption Tanya Khovanova November 8, 2010 Class Discussion Public Key Encryption. Digital Signatures.

Add to Reading List

Source URL: www.tanyakhovanova.com

Language: English - Date: 2011-02-15 14:51:25
139MICKEY / Keystream / Linear feedback shift register / E0 / Crypt / Stream ciphers / Cryptography / Grain

Some results on Sprout Subhadeep Banik DTU Compute, Technical University of Denmark, Lyngby. Email: Abstract. Sprout is a lightweight stream cipher proposed by Armknecht and Mikhalev at FSEIt

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-11 19:35:56
140Stream cipher / Algorithm / Crypt / 3GPP / KASUMI / Cryptography / A5/1 / Cipher

PDF Document

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2013-04-22 10:42:55
UPDATE