Crypt

Results: 686



#Item
241Cryptography / Password strength / Password / Crypt / OTPW / Random password generator / Security / Computer security / Access control

Password Policy Simulation and Analysis Richard J. K. Shay Purdue University West Lafayette, IN Abhilasha

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-07-19 22:34:09
242Electronic commerce / RSA / Function / Secret sharing / Secure multi-party computation / Crypt / Commitment scheme / Blinding / Cryptography / Public-key cryptography / Cryptographic protocols

Guaranteed Slowdown, Generalized Encryption Scheme, and Function Sharing Yury Lifshits∗ July 10, 2005 Abstract

Add to Reading List

Source URL: yury.name

Language: English - Date: 2008-11-06 22:10:32
243Cryptographic software / Computer law / Password cracking / Password / Rainbow table / Salt / Key stretching / Crypt / Bcrypt / Cryptography / Cryptographic hash functions / Key management

Password Hashing Competition - Survey and Benchmark George Hatzivasilis1 , Ioannis Papaefstathiou1 , and Charalampos Manifavas2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-22 05:43:55
244Access control / Password / Salt / Crypt / Security token / OTPW / Privileged password management / Security / Computer security / Cryptography

Measuring Password Guessability for an Entire University Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley? , Richard Shay, and Blase Ur ? Carn

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-11-20 15:25:38
245MD4 / SHA-2 / SHA-1 / RIPEMD / MD5 / Hash function / Keccak / MD2 / Crypt / Error detection and correction / Cryptographic hash functions / Cryptography

CA642: C RYPTOGRAPHY AND N UMBER T HEORY 8 1

Add to Reading List

Source URL: www.computing.dcu.ie

Language: English - Date: 2014-10-30 10:52:49
246Block cipher / Cipher / Stream cipher / Advanced Encryption Standard / ICE / Symmetric-key algorithm / Substitution cipher / S-box / Crypt / Cryptography / Data Encryption Standard / Ciphertext

SFWR 4C03: Computer Networks and Computer Security Mar[removed]Lecturer: Kartik Krishnan

Add to Reading List

Source URL: www4.ncsu.edu

Language: English - Date: 2005-12-03 12:37:56
247Cryptographic software / PGP / Passphrase / Key generation / X.509 / Key / Digital signature / Session key / Crypt / Cryptography / Key management / Public-key cryptography

Authora Inc[removed]removed] http://www.authora.com COPYRIGHT © [removed]AUTHORA INC. ALL RIGHTS RESERVED. NO PART OF THIS PUBLICATION MAY BE REPRODUCED,

Add to Reading List

Source URL: authora.com

Language: English - Date: 2013-03-28 16:03:22
248System software / TrueCrypt / 56-bit encryption / Encryption / Crypt / BitLocker Drive Encryption / Cryptographic software / Disk encryption / Software

Managing and Sharing Data: Training Resources – Encryption exercise

Add to Reading List

Source URL: www.data-archive.ac.uk

Language: English - Date: 2013-03-24 18:29:48
249System software / TrueCrypt / 56-bit encryption / Encryption / Crypt / BitLocker Drive Encryption / Cryptographic software / Disk encryption / Software

Managing and Sharing Data: Training Resources – Encryption exercise

Add to Reading List

Source URL: data-archive.ac.uk

Language: English - Date: 2013-03-24 18:29:48
250Cyberwarfare / Crypt / Cryptography / OTPW / Password strength / Security / Computer security / Password

Telepathwords: Preventing Weak Passwords by Reading Users’ Minds Saranga Komanduri, Richard Shay, and Lorrie Faith Cranor, Carnegie Mellon University; Cormac Herley and Stuart Schechter, Microsoft Research https://www.

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2014-09-26 15:50:05
UPDATE