Crypt

Results: 686



#Item
361Hashing / Search algorithms / Password / SHA-2 / Hash function / Crypt / Salt / PBKDF2 / Bcrypt / Cryptography / Cryptographic hash functions / Cryptographic software

Rig: A simple, secure and flexible design for Password Hashing Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India {donghoon,arpanj,swe

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-07 03:55:02
362Urban design / Chapel / Crypt / Elevator / Design / Knowledge / Architecture / Accessibility / Ergonomics / Transportation planning

For Visitors with Disabilities

Add to Reading List

Source URL: www.cathedral.org

Language: English - Date: 2008-10-06 15:23:58
363Error detection and correction / SHA-1 / Hash list / Hash function / Crypt / Digital signature / SHA / Magnet URI scheme / File verification / Cryptography / Cryptographic hash functions / Hashing

LandXML LandXML – Signing & Sealing by Warren G. Clary, PE

Add to Reading List

Source URL: www.iheep2014.com

Language: English - Date: 2015-01-22 17:50:03
364Ciphertext / Ransomware / Cipher / Symmetric-key algorithm / Key / RSA / Crypt / Data Encryption Standard / Key generation / Cryptography / Key management / Public-key cryptography

INTEGRATED  INTELLIGENCE  CENTER     Technical White Paper William  F.  Pelgrin,  CIS  President  and  CEO      

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-12-18 10:59:48
365Computer security / Cryptography / Cryptographic software / Password strength / Password manager / Password / Security / Crypt

PASSWORD PROTECTING A DOCUMENT IN WORD 2010 AND 2013 To add security to your document, encrypt it with a password using Word’s document protection feature, “Encrypt with Password”. 1. Go to File > Info. 2. Click on

Add to Reading List

Source URL: www.mcmaster.ca

Language: English - Date: 2014-11-04 16:43:13
366Computer security / Software / Cryptographic software / Password manager / Password strength / Password / Crypt / Security

PASSWORD PROTECTING A WORKBOOK IN EXCEL 2010 AND 2013 To add security to your workbook, encrypt it with a password using Excel’s document protection feature, “Encrypt with Password”. 1. Go to File > Info. 2. Click

Add to Reading List

Source URL: www.mcmaster.ca

Language: English - Date: 2014-11-04 16:43:13
367Ciphertext / Ransomware / Cipher / Symmetric-key algorithm / Key / RSA / Crypt / Data Encryption Standard / Key generation / Cryptography / Key management / Public-key cryptography

INTEGRATED  INTELLIGENCE  CENTER     Technical White Paper William  F.  Pelgrin,  CIS  President  and  CEO      

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-12-18 10:59:48
368Ciphertext / Ransomware / Cipher / Symmetric-key algorithm / Key / RSA / Crypt / Data Encryption Standard / Key generation / Cryptography / Key management / Public-key cryptography

INTEGRATED  INTELLIGENCE  CENTER     Technical White Paper William  F.  Pelgrin,  CIS  President  and  CEO      

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-12-18 11:00:45
369Password / John the Ripper / Passphrase / Dictionary attack / Key derivation function / Crypt / Crack / Part-of-speech tagging / Password manager / Cryptography / Computer security / Security

C:/Users/User/Dropbox/ResearchOld/passsphrase/CodaspyCameraReady/codasp040s-rao.dvi

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2012-12-19 23:22:32
370Ciphertext / Ransomware / Cipher / Symmetric-key algorithm / Key / RSA / Crypt / Data Encryption Standard / Key generation / Cryptography / Key management / Public-key cryptography

INTEGRATED  INTELLIGENCE  CENTER     Technical White Paper William  F.  Pelgrin,  CIS  President  and  CEO      

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-12-18 11:00:45
UPDATE