Crypt

Results: 686



#Item
201Key schedule / Twofish / Block ciphers / ICE / Entropy / Key size / Fortuna / Crypt / S-box / Cryptography / Advanced Encryption Standard / Key management

Twofish Technical Report #4 Further Observations on the Key Schedule of Twofish Doug Whiting∗ John Kelsey†

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
202Computing / Disk encryption / Hashing / Search algorithms / Crypt / MD5 / Payment Card Industry Data Security Standard / Tokenization / Hash function / Cryptography / Cryptographic hash functions / Computer security

PROTECTING STORED CARDHOLDER DATA (AN UNOFFICIAL SUPPLEMENT TO PCI DSS V3.0) Rob Chahin — rob[dot]chahin[at]nccgroup[dot]com iSEC Partners, Inc 123 Mission Street, Suite 1020

Add to Reading List

Source URL: www.isecpartners.com

Language: English - Date: 2015-02-18 09:34:54
203ICE / Crypt / Advanced Encryption Standard / Cipher / Paillier cryptosystem / Khufu and Khafre / Cryptography / Chosen-plaintext attack / Ciphertext

Cryptanalysis of Magenta Eli Biham, Alex Biryukov, Niels Ferguson, Lars R. Knudsen, Bruce Schneier, Adi Shamir August 20, 1998 Magenta is an encryption algorithm submitted for AES by Deutsche

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
204Password / Crypt / John the Ripper / Phishing / Privileged password management / OTPW / Security / Computer security / Cryptography

Improving Text Passwords Through Persuasion Alain Forget1,2 , Sonia Chiasson1,2 , P.C. van Oorschot1 , Robert Biddle2 1 School of Computer Science & 2 Human Oriented Technology Lab Carleton University, Ottawa, Canada

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2010-02-10 11:41:36
205Password / Salt / Crypt / Password strength / Password policy / Security / Cryptography / Computer security

Operating Systems R. Stockton Gaines Editor

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2005-06-29 13:02:32
206Hashing / Computing / Search algorithms / MD5 / HMAC / Crypt / Collision attack / SHA-1 / Md5sum / Error detection and correction / Cryptography / Cryptographic hash functions

1 MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-06 19:52:41
207Password / Crack / John the Ripper / Crypt / Cryptography / Password cracking / Password strength / Software / System software / Computer security

DESIGNING AND CRACKING ASSOCIATIVE PASSWORDS KIRSI HELKALA ASSOCIATE PROFESSOR GJØVIK UNIVERSITY COLLEGE

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-04 17:14:18
208Abstract algebra / Lattice problem / Lattice / Learning with errors / Vector space / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / Lattice-based cryptography / Algebra / Mathematics / Cryptography

The nc-Unique Shortest Vector Problem is Hard Vadim Lyubashevsky∗ Abstract The unique Shortest Vector Problem (uSVP) gained prominence because it was the problem upon which the first provably-secure lattice-based crypt

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-01 09:32:36
209Advanced Encryption Standard / Cryptanalysis / Crypt / Advantage / Chosen-plaintext attack / Block cipher / Stream ciphers / Boomerang attack / Data Encryption Standard / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

Cryptanalysis of Round-Reduced LED Ivica Nikoli´c, Lei Wang and Shuang Wu Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore {inikolic,wang.lei,w

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-05 23:11:43
210Preimage attack / SHA-2 / Hash function / SHA-1 / MD5 / Collision resistance / Collision / Crypt / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Dynamic Cryptographic Hash Functions William R. Speirs II and Samuel S. Wagstaff, Jr. Center for Education and Research in Information Assurance and Security (CERIAS) Department of Computer Sciences, Purdue University A

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-05-21 19:29:06
UPDATE