Crypt

Results: 686



#Item
141Access control / Identity management / Password / Cryptographic software / Passphrase / Salt / LastPass Password Manager / John the Ripper / Crypt / Security / Computer security / Cryptography

A A Large-Scale Evaluation of High-Impact Password Strength Meters XAVIER DE

Add to Reading List

Source URL: users.encs.concordia.ca

Language: English - Date: 2015-02-27 14:07:09
142Password / Salt / Passwd / John the Ripper / Key derivation function / Crypt / Password strength / OTPW / Cryptography / Computer security / Security

CERIAS Tech ReportErsatzPasswords Ending Password Cracking by Mohammed H. Almeshekah, Christopher N. Gutierrez, Mikhail J. Atallah and Eugene H. Spafford Center for Education and Research Information Assurance an

Add to Reading List

Source URL: www.cerias.purdue.edu

Language: English - Date: 2015-02-13 11:29:28
143PGP / Cryptographic software / GNU Privacy Guard / Web of trust / Crypt / Digital signature / Public key fingerprint / Key / ElGamal encryption / Cryptography / Public-key cryptography / Key management

The GNU Privacy Handbook The GNU Privacy Handbook Copyright © 1999 by The Free Software Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation Li

Add to Reading List

Source URL: www.gnupg.org

Language: English - Date: 2000-08-08 10:33:16
144Computing / PGP / Privacy software / Public-key cryptography / Email authentication / GNU Privacy Guard / Pretty Good Privacy / Crypt / GNU Free Documentation License / Cryptography / Computer security / Cryptographic software

Replacing PGP 2.x with GnuPG This article is based on an earlier PGP 2.x/GnuPG compatability guide (http://www.toehold.com/~kyle/pgpcompat.html) written by Kyle Hasselbacher (<>). Mike Ashley (Add to Reading List

Source URL: www.gnupg.org

Language: English - Date: 2000-08-08 10:34:54
145Bitcoin / Peer-to-peer computing / Graphics hardware / Salsa20 / Graphics processing unit / Crypt / Application-specific integrated circuit / Hash function / ASICS / Software / Computing / Electronic engineering

NeoScrypt - the latest proof of work algorithm As of the 26th of July 2014, NeoScrypt will be the latest proof of work (PoW) algorithm to hit the cryptocurrency world. It has been designed as an "ASIC-resistant" algorit

Add to Reading List

Source URL: www.feathercoin.com

Language: English - Date: 2014-07-26 13:27:07
146Cryptography / Password / HTTP cookie / JavaScript / Challenge-response authentication / Salt / Crypt / Cross-site scripting / PBKDF2 / Computer security / Computing / Cyberwarfare

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II Solutions

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2014-07-10 13:02:28
147Hashing / Message authentication codes / Search algorithms / Hash function / SHA-2 / Crypt / SHA-1 / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Cryptography

Lecture 15: Hashing for Message Authentication Lecture Notes on “Computer and Network Security” by Avi Kak () April 30, 2015 3:29pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-30 15:30:26
148Computing / Cloud storage / Online backup services / System software / Mozy / Web hosting / Crypt / Encrypting File System / Disk encryption / Cryptographic software / Software

Mozy Encryption Technology The MozyEnterprise® advantage Simple Seamlessly manage backup, sync, and mobile access for multi-user

Add to Reading List

Source URL: mozy.com

Language: English
149SHA-1 / RIPEMD / Hash function / Crypt / Hash list / MD4 / MD5 / Cryptographic hash functions / Cryptography / SHA-2

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Hash Functions —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:15:33
150Computer security / Mozilla add-ons / Key management / Password / LastPass Password Manager / PBKDF2 / Keychain / Key derivation function / Crypt / Cryptography / Software / Cryptographic software

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 15:32:02
UPDATE