Crypt

Results: 686



#Item
171Hashing / Hash function / SHA-2 / Key stretching / Crypt / Password / One-way compression function / Tabulation hashing / Hash table / Cryptography / Cryptographic hash functions / Search algorithms

STRICT MEMORY HARD HASHING FUNCTIONS (PRELIMINARY V0.3, SERGIO DEMIAN LERNER Abstract. We introduce the concept of strict memory hard functions. Strict memory hard functions are an extension of memory hard func

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2014-02-01 12:00:10
172Cryptographic software / Crypt / Disk encryption / Passphrase / USB flash drive / Windows / Personal identification number / Subscriber identity module / Encrypting File System / Cryptography / Microsoft Windows / System software

Validy_File_Crypt_SIM-e(spread).qxd

Add to Reading List

Source URL: www.validy.com

Language: English - Date: 2008-03-19 10:19:07
173SHA-1 / Key management / Digital Signature Algorithm / Secure Hash Standard / Digital signature / Data Encryption Standard / Crypt / SHA-2 / Cryptography standards / Cryptography / Cryptographic hash functions / Public-key cryptography

U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2002-12-15 10:54:51
174Cryptography / Password / Passphrase / Crypt / Password strength / Password manager / Security / Computer security / Access control

ABC Company Password Policy Policy Area IT Policy Library

Add to Reading List

Source URL: www.altiusit.com

Language: English - Date: 2015-01-10 16:30:23
175Computing / Password / Remote backup service / Crypt / Encryption / Encrypting File System / FileVault / Cryptographic software / Cryptography / Computer security

White Paper Benefits of Secure Off-Site Online Backup In today’s computing environment, businesses are relying on computers to perform daily business activities as well as mission critical functions. The use of compute

Add to Reading List

Source URL: www.firstbackup.com

Language: English - Date: 2007-03-16 17:00:00
176Password / Random password generator / John the Ripper / Crypt / Phishing / OTPW / Password manager / Cryptography / Security / Computer security

On The Ecological Validity of a Password Study Sascha Fahl, Marian Harbach, Yasemin Acar, Matthew Smith Usable Security and Privacy Laboratory Leibniz University Hannover, Germany fahl, harbach, acar, -h

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-07-04 18:50:01
177OpenVMS / Parallel computing / Quality control / DIGITAL Command Language / Crypt / Computing / Cluster computing / Hewlett-Packard

Encryption for OpenVMS Installation and Reference Manual Order Number: AA–EY97E–TE July 2001

Add to Reading List

Source URL: www.openvms.compaq.com

Language: English - Date: 2008-03-10 11:53:26
178Privileged Identity Management / Password / Lieberman Software / Data security / Crypt / Information security / Privileged password management / Password policy / Security / Computer security / Identity management

Financial Services Company Turns to Automation to Mitigate Emerging Security Threats

Add to Reading List

Source URL: www.liebsoft.com

Language: English - Date: 2011-02-14 17:34:00
179MD2 / SHA-2 / SHA-1 / Computer programming / Md5sum / Software / Binary file / Crypt / Cryptographic hash functions / Computing / MD5

Perl versiondocumentation - Digest::file NAME Digest::file - Calculate digests of files SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:24:19
180Hashing / Search algorithms / MD5 / X.509 / Simple public key infrastructure / Hash function / HMAC / Cryptographic hash function / Crypt / Cryptography / Public-key cryptography / Key management

Pisces User Manual Release 1.0 alpha 1 Jeremy Hylton April 27, 2000 Corporation for National Research Initiatives

Add to Reading List

Source URL: www.cnri.reston.va.us

Language: English - Date: 2013-05-09 14:48:28
UPDATE