Crypt

Results: 686



#Item
391Password / Health Insurance Portability and Accountability Act / Information security / Crypt / Internet privacy / Password manager / Jumbleme / Security / Computer security / Cryptography

Privacy & Information Security 1. All data must be stored on a UNMC computer network drive or an encrypted local hard drive. Do not create electronic storage areas on the internet (i.e. cloud computing) because such stor

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2012-07-30 13:38:38
392Key / Crypt / Science / Knowledge / Cryptography / Password / Cryptosystem

Smartphones set out to decipher a cryptographic system

Add to Reading List

Source URL: phys.org

Language: English - Date: 2014-11-29 21:09:38
393Preimage attack / NIST hash function competition / SHA-1 / Hash function / Crypt / SHA-2 / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Cryptography Research and Evaluation Committees

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:58:12
394NIST hash function competition / Authenticated encryption / Symmetric-key algorithm / Crypt / Advanced Encryption Standard / Cryptography / Cryptographic hash functions / Keccak

Tutorial on Keccak and SHA-3 by Guido Bertoni Abstract: Keccak has been selected as SHA-3 in[removed]It is a very flexible algorithm allowing to perform all the primitives of symmetric key cryptography: stream cipher, hash

Add to Reading List

Source URL: www.chesworkshop.org

Language: English - Date: 2014-07-02 15:54:48
395Cryptographic software / Disk encryption / Password / Crypt / Encrypting File System / Features new to Windows XP / Software / Microsoft Windows / System software

Security Encryption Tool and ESS Password Distribution DOP Security will encrypt user files distributed to the Agency ESS Distribution Points of Contact with CipherLock™ by Bokler Software Corp. Agency’s ESS Distri

Add to Reading List

Source URL: www.hr.wa.gov

Language: English - Date: 2012-11-09 03:45:51
396Microsoft Windows / System software / Disk encryption / Crypt / Encryption software / Encryption / Internet privacy / Public-key cryptography / Encrypting File System / Cryptographic software / Software / Cryptography

AFCARS Technical Bulletin #8 - AFCARS Encryption/Decryption Utility: C Version 2.1

Add to Reading List

Source URL: www.acf.hhs.gov

Language: English - Date: 2013-06-28 10:59:42
397Advanced Encryption Standard / Hashing / CRYPTREC / SHA-2 / National Security Agency / SHA-1 / Crypt / NESSIE / Secure Hash Standard / Cryptography / Cryptographic hash functions / Cryptography standards

X-Sieve: CMU Sieve[removed]Subject: Hash Algorithm Requirements and Evaluation Criteria. Date: Tue, 24 Apr[removed]:33:[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:18:28
398Password / Data security / Cryptography / Information security / Crypt / Password strength / Password policy / Security / Computer security / Access control

Information Technology Services Password Procedure Effective Date: January 18, 2003 Revised Date: February 18, 2004; February 1, 2006, September 13, 2011, October 7, 2011, Sept 24, 2013,

Add to Reading List

Source URL: www.unmc.edu

Language: English - Date: 2014-06-19 14:56:22
399Crypt / RadioGatún / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hash function

X-Sieve: CMU Sieve 2.2 Subject: Comments on Hash Function Criteria Date: Fri, 27 Apr[removed]:28:[removed]X-MS-Has-Attach: yes X-MS-TNEF-Correlator: Thread-Topic: Comments on Hash Function Criteria

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:24:16
400CRYPTREC / Collision resistance / Random oracle / Preimage attack / HMAC / Hash function / Crypt / Outline of cryptography / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

X-Sieve: CMU Sieve 2.2 Date: Fri, 27 Apr 2007 16:58:53 +0900 From: Atsuhiro Yamagishi User-Agent: Thunderbird 1.5.0.10 (Windows/20070221) To: hash-function@nist.gov, shu-jen.chang@nist.gov CC: cryptr

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:08:26
UPDATE