Crypt

Results: 686



#Item
331Keccak / NIST hash function competition / SHA-2 / Preimage attack / Merkle–Damgård construction / Crypt / Hash tree / SHA-1 / Secure Hash Standard / Cryptographic hash functions / Error detection and correction / Cryptography

SHA-3 Standard: Overview, Status, Public Comment

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:11:37
332Key Wrap / Galois/Counter Mode / Block cipher / CCM mode / Triple DES / Crypt / Cryptography / Block cipher modes of operation / Keccak

Special Publication on Authenticated Encryption

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:49:40
333Human–computer interaction / Radio-frequency identification / Block cipher modes of operation / Initialization vector / Crypt / Impinj / RFdump / Cryptography / Automatic identification and data capture / Technology

Accepted to JTAER at May 7, 2009 Read / Write Performance for low memory passive HF RFID tag-reader system Chih-Cheng Ou Yang1, B.S. Prabhu2, Charlie Qu3, Chi-Cheng Chu4, and Rajit Gadh5

Add to Reading List

Source URL: www.wireless.ucla.edu

Language: English - Date: 2009-07-22 15:57:32
334Amontillado / Niter / Geography / Earth / Subterranea / The Cask of Amontillado / Catacombs

Reading and Vocabulary Worksheets http://www.readingcomprehensionworksheets.net/ Edgar Allan Poe. From “The Cask of Amontillado” At the most remote end of the crypt there appeared another less spacious. Its walls ha

Add to Reading List

Source URL: www.readingcomprehensionworksheets.net

Language: English - Date: 2012-04-18 09:16:59
335Cryptography / Identity management / Cryptographic software / Password / Random password generator / Passphrase / Roboform / KeePass / Crypt / Security / Computer security / Access control

Microsoft Word - UEDP_A_635497

Add to Reading List

Source URL: eprints.ulster.ac.uk

Language: English - Date: 2011-12-14 06:05:39
336Password / PBKDF2 / Brute-force attack / Bcrypt / Crypt / Key stretching / Rainbow table / Cryptography / Key management / Key derivation function

scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2015-01-21 18:21:31
337Milwaukee County /  Wisconsin / Wisconsin / Burial / Grave / Crypt / Death customs / Culture / Cemetery

Catholic Cemeteries Policy Handout.pub (Read-Only

Add to Reading List

Source URL: www.catholiccem.com

Language: English - Date: 2011-07-15 12:13:35
338Password / Random password generator / Hacker / Crypt / Cryptographic software / Password policy / Password cracking / Security / Computer security / Cryptography

Bop Design Reminds Business Owners of the Importance of Secure Online Passwords The Next Web recently reported that Google will soon allow Android users to sync their passwords between the Chrome web browser on their pho

Add to Reading List

Source URL: www.prweb.com

Language: English - Date: 2013-01-31 14:55:57
339Keccak / Threefish / Cryptographic hash function / Joan Daemen / Grøstl / ARM architecture / Crypt / 64-bit / BLAKE / Cryptography / NIST hash function competition / Skein

Comparison of seven SHA-3 candidates software implementations on smart cards. Mourad Gouicem∗ Oberthur Technologies Contact : {g.piret, e.prouff}@oberthur.com October 2010

Add to Reading List

Source URL: www-pequan.lip6.fr

Language: English - Date: 2011-09-20 16:50:32
340Mathematical logic / Hashing / Crypt / SHA-1 / Cipher / Block cipher / MD4 / Mathematical proof / Cryptography / Mathematics / Cryptographic hash functions

State Of The Art The Result A Proof Outline

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
UPDATE