Crypt

Results: 686



#Item
191Cryptography / Applied mathematics / Crypt / Field-programmable gate array / Key derivation function / Password / Salt / MD5 / SHA-2 / Cryptographic hash functions / Mathematics / Key management

PRINCE modern password guessing algorithm Why do we need a new attack-mode? FUTURE OF PASSWORD HASHES

Add to Reading List

Source URL: hashcat.net

Language: English - Date: 2014-12-08 07:12:08
192Cryptographic software / Hashing / Block cipher / SHA-1 / Cipher / Cryptographic primitive / Crypt / CRYPTREC / BeeCrypt / Cryptography / Advanced Encryption Standard / Cryptographic hash functions

Performance of Protocols (Extended Abstract) Michael Roe Centre for Communications Systems Research 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:55
193Public-key cryptography / Electronic commerce / Key / Secure voice / Crypt / RSA / Cryptography / Secure communication / Key management

1 2 Contents Preface.................................................................................................................................................. 3

Add to Reading List

Source URL: www.mttgroup.ch

Language: English - Date: 2014-11-18 04:09:23
194Key management / SAFER / Padding / Slide attack / Weak key / Key schedule / Crypt / ICE / SXAL/MBAL / Cryptography / Block ciphers / Advanced Encryption Standard

Key Schedule Weaknesses in SAFER+ John Kelsey ∗ Bruce Schneier†

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
195Cryptography / Password / Crypt / John the Ripper / Password policy / Cognitive password / Computer security / Security / Access control

Does My Password Go up to Eleven? The Impact of Password Meters on Password Selection Serge Egelman1 , Andreas Sotirakopoulos2 , Ildar Muslukhov2 , Konstantin Beznosov2 , and Cormac Herley3 1 2

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2013-04-29 12:12:39
196Cryptography / System administration / Unix / Password / Salt / Shadow password / Crypt / Password strength / Passwd / System software / Computer security / Software

‘‘Foiling the Cracker’’: A Survey of, and Improvements to, Password Security† Daniel V. Klein Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15217

Add to Reading List

Source URL: geodsoft.com

Language: English - Date: 2003-11-09 11:25:55
197Password / Crypt

  USER MANUAL DL3/DL3 FE ------------------------- March 2015 -------------------------

Add to Reading List

Source URL: datalocker.com

Language: English - Date: 2015-03-26 16:35:36
198Serpent / ICE / Advanced Encryption Standard / Completeness / Chosen-plaintext attack / Crypt / Ciphertext / Block cipher / Cryptography / Boomerang attack / Differential cryptanalysis

Preliminary Cryptanalysis of Reduced-Round Serpent Tadayoshi Kohno1? , John Kelsey2 , and Bruce Schneier2 1 Reliable Software Technologies

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
199Cryptanalysis / Block cipher / MARS / DES-X / Crypt / Advantage / Differential cryptanalysis / Boomerang attack / Cryptography / Data Encryption Standard / Advanced Encryption Standard

MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants John Kelsey and Bruce Schneier Counterpane Internet Security, Inc., 3031 Tisch Way, San Jose, CA 95128 {kelsey,schneier}@counterpane.com

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
200Differential-linear attack / Key schedule / Block cipher / Crypt / Data Encryption Standard / SHACAL / Cryptography / Differential cryptanalysis / ICE

Cryptanalysis of SPEED Chris Hall1 , John Kelsey1 , Vincent Rijmen2 , Bruce Schneier1 , and David Wagner3 1 2

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
UPDATE