Crypt

Results: 686



#Item
221Trivium / Throughput / Algorithm / Crypt / Applied mathematics / Stream ciphers / Mathematics / Achterbahn

Hardware Evaluation of eS TREAM Candidates: Achterbahn, Grain, M ICKEY, M OSQUITO , S FINKS , Trivium, V EST, ZK-Crypt Frank K. Gürkaynak1, Peter Luethi1 , Nico Bernold2 , René Blattmann2 , Victoria Goode2, Marcel Marg

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2006-02-13 07:41:31
222Cyberwarfare / Computer security / Rainbow table / Password / SHA-2 / Crypt / Hash function / Password strength / Salt / Cryptography / Cryptographic hash functions / Search algorithms

CIS 331 Introduction to Networks & Security February 10, 2015 Homework 3: Passwords

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-02-10 00:30:21
223Password / Passphrase / Password manager / Random password generator / Crypt / Password policy / Security / Computer security / Cryptography

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 3 Passwords

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-24 12:29:57
224Elliptic curve cryptography / BasicCard / Digital signature / IEEE P1363 / SHA-1 / Crypt / Integrated Encryption Scheme / Elliptic Curve DSA / Cryptography / Public-key cryptography / Cryptographic hash functions

Elliptic Curves in the BasicCard Tony Guilfoyle ZeitControl cardsystems GmbH e-mail: 14th February 2000

Add to Reading List

Source URL: www.basiccard.com

Language: English - Date: 2000-02-16 08:07:52
225Password / Key management / John the Ripper / Crypt / Key derivation function / Brute-force attack / OTPW / Shadow password / Cryptography / Security / Computer security

Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Trent Jaeger Systems and Internet Infrastructure Securit

Add to Reading List

Source URL: www.enck.org

Language: English
226Public safety / Cryptography / Computer network security / Electronic commerce / Information security / Encryption / Computer security / Security / Crime prevention / National security

Comments to the Green Book “La protection juridique des services crypt´es dans le march´e int´erieur” Dr. Josep Domingo-Ferrer Ricardo X. S´anchez del Castillo

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1998-03-17 14:33:24
227Health / Epidemiology / Crypt / Globally unique identifier / Information / Science / Computer algebra / Data management / Record linkage

Epidemiological and Statistical Secured Matching in France Catherine Quantin1-2*, Benoît Riandey3 1- CHRU Dijon, Service de Biostatistique et d’Informatique Médicale (DIM), Dijon, F21000, France. Contact author : cat

Add to Reading List

Source URL: www.statistics.gov.hk

Language: English - Date: 2013-08-22 04:39:22
228Hashing / MD5 / HMAC / SHA-2 / Collision attack / SHA-1 / Crypt / Merkle–Damgård construction / Hash function / Error detection and correction / Cryptographic hash functions / Cryptography

CIS 331 Introduction to Networks & Security January 23, 2014 Project 1: Attacking Cryptographic Hashes

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-11-18 15:19:13
229Cyberwarfare / Password / Computer crimes / Passphrase / John the Ripper / Phishing / Crypt / Password policy / Cognitive password / Computer security / Security / Cryptography

Text Entry Method Affects Password Security Yulong Yang† , Janne Lindqvist† , Antti Oulasvirta‡ † Rutgers University, ‡ Aalto University Abstract Background. Text-based passwords continue to be the

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-21 23:17:08
230Phishing / Password / Computing / Transaction authentication number / Malware / Crypt / Website spoofing / Computer security / Social engineering / Spamming / Internet

Some open problems with RIPA Pt.3 Caspar Bowden (Director FIPRScrambling for Safety - 14th Augustthis presentation reflects personal views only)

Add to Reading List

Source URL: www.fipr.org

Language: English - Date: 2006-08-16 07:52:32
UPDATE