Crypt

Results: 686



#Item
51Low-Cost SHA-1 Hash Function Architecture for RFID Tags M. O’Neill (nee McLoone) Institute of Electronics, Communications, and Information Technology (ECIT) Queen’s University Belfast, Northern Ireland

Low-Cost SHA-1 Hash Function Architecture for RFID Tags M. O’Neill (nee McLoone) Institute of Electronics, Communications, and Information Technology (ECIT) Queen’s University Belfast, Northern Ireland

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-21 05:29:13
52C:�uments and Settings�ppeng�ktop� add plan.wpd

C:uments and Settingsppengktop add plan.wpd

Add to Reading List

Source URL: www.oakhillcemeterydc.org

- Date: 2010-02-24 08:01:28
53Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

Add to Reading List

Source URL: www.estv.admin.ch

Language: English
54Ω  Omega Crypt (ocrypt) Brandon Enright  http://www.brandonenright.net/ocrypt/

Ω Omega Crypt (ocrypt) Brandon Enright http://www.brandonenright.net/ocrypt/

Add to Reading List

Source URL: password-hashing.net

Language: English
55Parallel Steve Thomas (Steve at tobtu dot com) Specification Symbols/functions **

Parallel Steve Thomas (Steve at tobtu dot com) Specification Symbols/functions **

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-02-03 09:25:05
56Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-10-16 08:19:35
57Images and dm-crypt and LVM2… Oh mount! Speaker Name and info Hal Pomeranz Deer Run Associates

Images and dm-crypt and LVM2… Oh mount! Speaker Name and info Hal Pomeranz Deer Run Associates

Add to Reading List

Source URL: www.deer-run.com

Language: English - Date: 2011-05-27 21:21:17
58Gambit A sponge based, memory hard key derivation function Krisztián Pintér ()  Pseudocode S

Gambit A sponge based, memory hard key derivation function Krisztián Pintér ()  Pseudocode S

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-14 07:18:05
59Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

Add to Reading List

Source URL: www.estv.admin.ch

Language: English
60Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

Add to Reading List

Source URL: password-hashing.net

Language: English