Crypt

Results: 686



#Item
71Multi-level behaviours in agent-based simulation: colonic crypt cell populations Chih-Chun Chen Department of Computer Science,

Multi-level behaviours in agent-based simulation: colonic crypt cell populations Chih-Chun Chen Department of Computer Science,

Add to Reading List

Source URL: necsi.edu

Language: English - Date: 2007-09-28 06:09:49
72PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres

PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-12-09 05:42:43
73This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn

This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-02-21 09:51:42
74Schedule UbiCrypt Summer School crypt@b-it:30-9:15 09:15-09:30 09:30-11:00

Schedule UbiCrypt Summer School crypt@b-it:30-9:15 09:15-09:30 09:30-11:00

Add to Reading List

Source URL: www.ubicrypt.hgi.rub.de

- Date: 2014-05-14 11:26:38
    75Oblivious PAKE: Efficient Handling of Password Trials F. Kiefer, M. Manulis

    Oblivious PAKE: Efficient Handling of Password Trials F. Kiefer, M. Manulis

    Add to Reading List

    Source URL: isc2015.item.ntnu.no

    Language: English - Date: 2015-09-19 12:50:59
    76A New Attack on Random Pronounceable Password Generators  Ganesan and Davies A New Attack on Random Pronounceable Password Generators

    A New Attack on Random Pronounceable Password Generators Ganesan and Davies A New Attack on Random Pronounceable Password Generators

    Add to Reading List

    Source URL: www.findravi.com

    Language: English - Date: 2009-04-03 23:54:54
    77STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

    STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

    Add to Reading List

    Source URL: www.daemonology.net

    Language: English - Date: 2009-06-11 07:29:01
    78Lattice-Based Cryptography: Mathematical and Computational Background Chris Peikert Georgia Institute of Technology  crypt@b-it 2013

    Lattice-Based Cryptography: Mathematical and Computational Background Chris Peikert Georgia Institute of Technology crypt@b-it 2013

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2015-09-08 16:32:03
      79Lattice-Based Cryptography: Constructing Trapdoors and More Applications Chris Peikert Georgia Institute of Technology  crypt@b-it 2013

      Lattice-Based Cryptography: Constructing Trapdoors and More Applications Chris Peikert Georgia Institute of Technology crypt@b-it 2013

      Add to Reading List

      Source URL: web.eecs.umich.edu

      Language: English - Date: 2015-09-08 16:32:04
        80FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

        FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

        Add to Reading List

        Source URL: nvlpubs.nist.gov

        Language: English - Date: 2015-08-04 11:33:21