Crypt

Results: 686



#Item
511Password / Data security / Information security / Two-factor authentication / Crypt / Privileged password management / Password strength / Security / Computer security / Access control

Level 3 – Public Information Technology CSUN Password Standards and Guidelines SOP#: [removed]Prepared by: Unknown

Add to Reading List

Source URL: www.csun.edu

Language: English - Date: 2014-03-11 15:55:20
512Password / Computer security / Crypt / Encryption / Cyberwarfare / Password manager / Sticky Password Manager / Cryptographic software / Cryptography / Disk encryption

Cyber Alert: Heartbleed What is Heartbleed Heartbleed is a computer bug that attacks an organization’s computer servers. A server has encryption software to protect passwords, user ID and other personally identifiable

Add to Reading List

Source URL: readywisconsin.wi.gov

Language: English - Date: 2014-04-11 09:52:45
513Advanced Encryption Standard / Cryptographic hash functions / FIPS 140-2 / HMAC / Crypt / SHA-1 / Symmetric-key algorithm / Key size / Microsoft CryptoAPI / Cryptography / Hashing / Cryptographic software

Symantec Cryptographic Module 1.0 FIPS[removed]Non-Proprietary Security Policy 1.0 Symantec Cryptographic Module

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
514Error detection and correction / Search algorithms / SHA-2 / SHA-1 / MD5 / Collision / Hash function / Crypt / Digital signature / Cryptography / Cryptographic hash functions / Hashing

Microsoft Word - LE-Hashing-Analysis-WERB-r10.doc

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2006-06-05 17:00:20
515Cryptographic hash functions / Search algorithms / Bloom filter / Hash function / Fingerprint / Crypt / Rabin fingerprint / SHA-1 / Feature selection / Cryptography / Hashing / Error detection and correction

Chapter 8 DATA FINGERPRINTING WITH SIMILARITY DIGESTS Vassil Roussev Abstract

Add to Reading List

Source URL: roussev.net

Language: English - Date: 2013-07-17 18:45:01
516Search algorithms / Error detection and correction / Hash function / Crypt / Secure Hash Standard / SHA-2 / NIST hash function competition / Cryptography / Cryptographic hash functions / Hashing

mstockstill on PROD1PC70 with NOTICES Federal Register / Vol. 72, No[removed]Tuesday, January 23, [removed]Notices or through the email hotline – vietnam– texapp-monitor–[removed]. PRODUCT COVERAGE: The

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:28:18
517Cryptographic protocols / Cryptographic software / PKCS / Key / Microsoft CryptoAPI / Password / Cryptographic hash function / Crypt / RSA / Cryptography / Public-key cryptography / Key management

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
518Cryptographic software / Secure Shell / Ssh-keygen / Password / Passphrase / Key generation / Crypt / Public-key cryptography / Key / Cryptography / Software / Key management

D-way Submission Account Manual Ver[removed]DNA Data Bank of Japan

Add to Reading List

Source URL: trace.ddbj.nig.ac.jp

Language: English - Date: 2013-04-10 04:16:23
519FIPS 140-2 / Public-key cryptography / Zeroisation / Crypt / Block cipher modes of operation / Cryptography / Key management / Key

Security Policy: Astro Subscriber Universal Crypto Module Astro Spectra Plus and XTS5000 Version[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
520SHA-2 / SHA-1 / Crypt / Hash function / Transport Layer Security / Error detection and correction / Cryptographic hash functions / Cryptography

The Secure Hash Algorithm Validation System (SHAVS) Updated: May 21, 2014 Created: July 22, 2004 Lawrence E. Bassham III

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-21 09:13:37
UPDATE