Crypt

Results: 686



#Item
71Immunology / Cellular processes / Scientific modeling / Simulation / Cell biology / Clone / Agent-based model / Cell cycle / Cellular differentiation / Discrete event simulation / T cell / Carcinogenesis

Multi-level behaviours in agent-based simulation: colonic crypt cell populations Chih-Chun Chen Department of Computer Science,

Add to Reading List

Source URL: necsi.edu

Language: English - Date: 2007-09-28 06:09:49
72Cryptography / Computer security / Computer access control / Cryptographic hash functions / Key management / Password / Security / Salt / Crypt / Passwd / Challengeresponse authentication / Key stretching

PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-12-09 05:42:43
73Cryptography / Cryptographic hash functions / Public-key cryptography / Hashing / Search algorithms / CramerShoup cryptosystem / RSA / ElGamal encryption / Crypt / Hash function / Ciphertext / Universal one-way hash function

This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-02-21 09:51:42
74

Schedule UbiCrypt Summer School crypt@b-it:30-9:15 09:15-09:30 09:30-11:00

Add to Reading List

Source URL: www.ubicrypt.hgi.rub.de

- Date: 2014-05-14 11:26:38
    75Cryptography / Computer access control / Cryptographic protocols / Password-authenticated key agreement / Password / Passwd / Encrypted key exchange / Crypt / Password Authenticated Key Exchange by Juggling

    Oblivious PAKE: Efficient Handling of Password Trials F. Kiefer, M. Manulis

    Add to Reading List

    Source URL: isc2015.item.ntnu.no

    Language: English - Date: 2015-09-19 12:50:59
    76Cryptography / Password / Security / Cryptographic hash functions / Salt / Random password generator / Passwd / Crypt / Dictionary attack / Password strength / OTPW

    A New Attack on Random Pronounceable Password Generators Ganesan and Davies A New Attack on Random Pronounceable Password Generators

    Add to Reading List

    Source URL: www.findravi.com

    Language: English - Date: 2009-04-03 23:54:54
    77Cryptography / Hashing / Search algorithms / Cryptographic hash functions / Hash function / Hash table / RSA / Crypt / Block cipher / Universal hashing / Scrypt

    STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

    Add to Reading List

    Source URL: www.daemonology.net

    Language: English - Date: 2009-06-11 07:29:01
    78

    Lattice-Based Cryptography: Mathematical and Computational Background Chris Peikert Georgia Institute of Technology crypt@b-it 2013

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2015-09-08 16:32:03
      79

      Lattice-Based Cryptography: Constructing Trapdoors and More Applications Chris Peikert Georgia Institute of Technology crypt@b-it 2013

      Add to Reading List

      Source URL: web.eecs.umich.edu

      Language: English - Date: 2015-09-08 16:32:04
        80Cryptography / Cryptographic hash functions / Hashing / Message authentication codes / Error detection and correction / Secure Hash Algorithm / SHA-2 / Secure Hash Standard / SHA-1 / SHA-3 / Crypt / Digital Signature Algorithm

        FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

        Add to Reading List

        Source URL: nvlpubs.nist.gov

        Language: English - Date: 2015-08-04 11:33:21
        UPDATE