Crypt

Results: 686



#Item
251Block cipher / Chosen-plaintext attack / Plaintext / Known-plaintext attack / Crypt / Ciphertext / Cipher / ICE / Data Encryption Standard / Cryptography / Format-preserving encryption / Advanced Encryption Standard

Analysis of VAES3 (FF2) Morris Dworkin Ray Perlner National Institute of Standards and Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-02 13:14:10
252Password / Security token / Crypt / Password cracking / OTPW / Security / Computer security / Access control

Encountering Stronger Password Requirements: User Attitudes and Behaviors Richard Shay Saranga Komanduri

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-07-19 22:34:09
253

Microsoft Word - デモPC貸出申込書.doc

Add to Reading List

Source URL: www.crypt-s.com

Language: Japanese - Date: 2009-12-19 20:38:22
    254Cryptographic software / Password / Portable Document Format / Crypt / Environment variable / Computing / System software / Software

    Welcome to Unibase by changes/enhancements to readme.txt DMAC. This text file

    Add to Reading List

    Source URL: www.dmac-unibase.com

    Language: English - Date: 2012-12-13 11:00:48
    255Unix / Crypt / File system / Computer virus / Operating system / Microsoft Word / Software / System software / Antivirus software

    Cybersoft.com CyberSoft White Papers Special Attributes of the VFind Tool Kit Peter V. Radatti CyberSoft, Inc.

    Add to Reading List

    Source URL: www.cybersoft.com

    Language: English - Date: 2013-08-13 11:07:11
    256Cryptographic software / System software / Instruction set architectures / Password / Crypt / John the Ripper / ARM architecture / Central processing unit / Field-programmable gate array / Software / Computer architecture / Bcrypt

    Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware Katja Malvoni (kmalvoni at openwall.com)

    Add to Reading List

    Source URL: www.openwall.com

    Language: English - Date: 2014-08-19 09:20:20
    257Flagship compiler / Computing / Computer programming / Software engineering / Password / MD5 / Crypt

    MultiSoft Corporation Legtricity Integration Guideline Web Service Signature Overview Version 1.0

    Add to Reading List

    Source URL: www.legtricity.com

    Language: English - Date: 2015-01-16 13:14:23
    258Electronics / Bcrypt / Cryptographic software / Computer architecture / Crypt / Multi-core processor / John the Ripper / Brute-force attack / Field-programmable gate array / Cryptography / Computing / GPGPU

    Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware Katja Malvoni [removed] University of Zagreb, Croatia

    Add to Reading List

    Source URL: www.openwall.com

    Language: English - Date: 2014-07-23 00:08:16
    259Skeleton / Lich / Cleric / The Crypt / Ghost / Dungeons & Dragons / Fantasy / Undead

    THE LORDS OF DARKNESS Table of Contents INTRODUCTION . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Add to Reading List

    Source URL: cdn.preterhuman.net

    Language: English - Date: 2012-10-01 20:13:29
    260Cyberwarfare / Password / Fear appeals / Crypt / Password policy / Security / Cryptography / Computer security

    How Interactivity Can Enhance the Effectiveness of Fear Appeals: A Web-based Field Experiment of Password Security Anthony Vance, David Eargle, Kirk Ouimet Brigham Young University Detmar Straub Georgia State University

    Add to Reading List

    Source URL: www.kirkouimet.com

    Language: English - Date: 2013-04-02 01:59:02
    UPDATE