Crypt

Results: 686



#Item
481Advanced Encryption Standard / Collision attack / Crypt / Collision / SHA-1 / MD4 / Cryptographic hash functions / Cryptography / NIST hash function competition

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:17:38
482Password / Cryptography / Crypt / Draw a Secret / Password strength / OTPW / Security / Computer security / Access control

The Design and Analysis of Graphical Passwords Ian Jermyn New York University [removed]

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:36
483NIST hash function competition / Crypt / Information retrieval / Artificial intelligence / Computing / Cryptographic hash functions / Hash function / Block cipher

outbind://216-00000000C28D6AD45D681F4D837CF97C3377EF1B0700D7A04

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:39:12
484Cyberwarfare / Password / Passphrase / Crypt / Password strength / Password policy / Security / Computer security / Cryptography

COMPUTER PASSWORDS POLICY 1.0 PURPOSE This policy describes the requirements for acceptable password selection and maintenance to maximize

Add to Reading List

Source URL: www.chinleusd.k12.az.us

Language: English - Date: 2012-10-15 17:06:46
485Cemetery / New York

Cemeteries should be aware of the proper procedures involved in removing any remains from any place of interment. (NPCL § 1510(e) Removals.) Before removing any remains from a grave, crypt or niche, consent must be give

Add to Reading List

Source URL: www.dos.ny.gov

Language: English - Date: 2011-06-24 08:13:33
486Email encryption / Crypt / Public-key cryptography / Disk encryption / Jumbleme / XML Encryption / Cryptography / Internet privacy / Email authentication

Microsoft PowerPoint - Secure Email at IU - 2

Add to Reading List

Source URL: www.iub.edu

Language: English - Date: 2014-09-06 01:25:41
487Computer file formats / Open formats / Markup languages / Technical communication / Email / XML / Hash function / Crypt / Computing / OSI protocols / Electronic documents

RTF Document

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2013-07-31 10:37:07
488NIST hash function competition / Secure Hash Standard / SHA-1 / Keccak / Federal Information Processing Standard / Crypt / National Institute of Standards and Technology / SHA-2 / Digital Signature Algorithm / Cryptography / Error detection and correction / Cryptographic hash functions

Federal Register / Vol. 79, No[removed]Wednesday, May 28, [removed]Notices product or service. In the case of a trade association, the applicant must certify that, for each company to be represented by the trade association

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2014-05-28 10:25:54
489NIST hash function competition / Hashing / Vlastimil Klíma / Preimage attack / Crypt / Hash function / CubeHash / SHA-2 / Cryptography / Error detection and correction / Cryptographic hash functions

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:14:28
490Computer architecture / Advanced Encryption Standard / SHA-1 / SHA-2 / Cell / SIMD / Crypt / MD5 / Central processing unit / Cryptographic hash functions / Computing / Cryptography

NPS-CS[removed]NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2010-10-29 15:38:04
UPDATE