Crypt

Results: 686



#Item
51Cryptographic hash functions / SHA-2 / SHA-1 / Radio-frequency identification / Crypt / Hash function / Secure Hash Algorithm / VEST / SHA-3

Low-Cost SHA-1 Hash Function Architecture for RFID Tags M. O’Neill (nee McLoone) Institute of Electronics, Communications, and Information Technology (ECIT) Queen’s University Belfast, Northern Ireland

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-21 05:29:13
52Death customs / Cremation / Fire / Incineration / Crypt / Dubuque /  Iowa / Cedar Memorial / Mount Olivet Cemetery

C:uments and Settingsppengktop add plan.wpd

Add to Reading List

Source URL: www.oakhillcemeterydc.org

- Date: 2010-02-24 08:01:28
53Cryptography / Cryptographic hash functions / Password / Security / Crypt / SHA-1 / Encryption / Database encryption / Password cracking

Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

Add to Reading List

Source URL: www.estv.admin.ch

Language: English
54Cryptography / CubeHash / Cryptographic hash function / Crypt / Hash function / Stream cipher / PBKDF2 / Scrypt / Salt / Password / Bcrypt / Key derivation function

Ω Omega Crypt (ocrypt) Brandon Enright http://www.brandonenright.net/ocrypt/

Add to Reading List

Source URL: password-hashing.net

Language: English
55Cryptography / Cryptographic hash functions / Search algorithms / Hashing / Hash function / SHA-2 / Password / SHA-1 / Salt / MD5 / Crypt

Parallel Steve Thomas (Steve at tobtu dot com) Specification Symbols/functions **

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-02-03 09:25:05
56Cryptography / Cryptographic hash functions / Hashing / Cryptographic software / Key management / Crypt / Scrypt / SHA-2 / Password / Hash function / PBKDF2 / Salt

Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-10-16 08:19:35
57System software / Computer architecture / Software / Disk file systems / Disk encryption / Cryptographic software / FreeBSD / GEOM / Dm-crypt / Loop device / Device file / Dd

Images and dm-crypt and LVM2… Oh mount! Speaker Name and info Hal Pomeranz Deer Run Associates

Add to Reading List

Source URL: www.deer-run.com

Language: English - Date: 2011-05-27 21:21:17
58Cryptography / Cryptographic hash functions / NIST hash function competition / SHA-3 / Sponge function / Password / Crypt / Hash function / Exclusive or / Key derivation function / Lyra2

Gambit A sponge based, memory hard key derivation function Krisztián Pintér ()  Pseudocode S

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-14 07:18:05
59Cryptography / Cryptographic hash functions / Password / Security / Crypt / SHA-1 / Encryption / Database encryption

Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

Add to Reading List

Source URL: www.estv.admin.ch

Language: English
60Cryptography / Cryptographic hash functions / Key management / Pseudorandomness / Search algorithms / PBKDF2 / Password / Scrypt / Crypt / Key derivation function / Pseudorandom function family / Salt

Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

Add to Reading List

Source URL: password-hashing.net

Language: English
UPDATE