141 | Add to Reading ListSource URL: users.encs.concordia.caLanguage: English - Date: 2015-02-27 14:07:09
|
---|
142 | Add to Reading ListSource URL: www.cerias.purdue.eduLanguage: English - Date: 2015-02-13 11:29:28
|
---|
143 | Add to Reading ListSource URL: www.gnupg.orgLanguage: English - Date: 2000-08-08 10:33:16
|
---|
144 | |
---|
145 | NeoScrypt - the latest proof of work algorithm As of the 26th of July 2014, NeoScrypt will be the latest proof of work (PoW) algorithm to hit the cryptocurrency world. It has been designed as an "ASIC-resistant" algoritAdd to Reading ListSource URL: www.feathercoin.comLanguage: English - Date: 2014-07-26 13:27:07
|
---|
146 | Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II SolutionsAdd to Reading ListSource URL: css.csail.mit.eduLanguage: English - Date: 2014-07-10 13:02:28
|
---|
147 | Lecture 15: Hashing for Message Authentication Lecture Notes on “Computer and Network Security” by Avi Kak () April 30, 2015 3:29pmAdd to Reading ListSource URL: engineering.purdue.eduLanguage: English - Date: 2015-04-30 15:30:26
|
---|
148 | Mozy Encryption Technology The MozyEnterprise® advantage Simple Seamlessly manage backup, sync, and mobile access for multi-userAdd to Reading ListSource URL: mozy.comLanguage: English |
---|
149 | Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Hash Functions —Add to Reading ListSource URL: www.ipa.go.jpLanguage: English - Date: 2013-05-28 08:15:33
|
---|
150 | PDF DocumentAdd to Reading ListSource URL: media.blackhat.comLanguage: English - Date: 2012-04-07 15:32:02
|
---|