Crypt

Results: 686



#Item
81Software engineering / Software / Computer programming / Cross-platform software / Perl / High-level programming languages / Scripting languages / CGI.pm / Common Gateway Interface / Outline of Perl / Perl 6

CGI Programming with Perl #!/usr/bin/perl # It Came From the Crypt! $q=

Add to Reading List

Source URL: www.perltraining.com.au

Language: English - Date: 2005-08-01 23:49:40
82Password / Security / Cryptography / Unix / Passwd / Monosodium glutamate / Crypt / Guessing / Name Service Switch

How to prevent type-flaw guessing attacks on password protocols Sreekanth Malladi and Jim Alves-Foss University of Idaho, USA. June 22, 2003

Add to Reading List

Source URL: www.qatar.cmu.edu

Language: English - Date: 2004-12-05 23:21:27
83

Lattice-Based Cryptography: Ring-Based Primitives and Open Problems Chris Peikert Georgia Institute of Technology crypt@b-it 2013

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2015-09-08 16:32:01
    84

    c de Gruyter 2007 DOIJMCJ. Math. Crypt), 1–16

    Add to Reading List

    Source URL: www.isical.ac.in

    Language: English - Date: 2011-12-28 03:46:39
      85Software / Computer access control / Computer security / Cryptographic software / Identity management / Hacking / Password manager / Password / Keychain / Cross-site scripting / Clickjacking / Crypt

      Protecting Users Against XSS-based Password Manager Abuse Ben Stock Martin Johns

      Add to Reading List

      Source URL: dl.dropboxusercontent.com

      Language: English
      86Cryptography / Computer access control / Computer security / Password / Security / Brute-force attack / Hashcat / John the Ripper / Crypt / Guessing / Security hacker / Password fatigue

      Measuring Real-World Accuracies and Biases in Modeling Password Guessability Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek† , Willi

      Add to Reading List

      Source URL: www.blaseur.com

      Language: English - Date: 2015-08-12 14:36:57
      87Cryptography / Hashing / Error detection and correction / Cryptographic hash functions / Search algorithms / Commitment scheme / Hash function / Coin flipping / RSA / Crypt

      Very-efficient flipping of many coins (between two parties) Luís T. A. N. Brandão University of Lisbon and Carnegie Mellon University

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2014-03-01 16:01:06
      88Cryptography / Key management / Scrypt / Key derivation function / Password cracking / PBKDF2 / Password / Bcrypt / Brute-force attack / Crypt / Passwd / Key

      scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

      Add to Reading List

      Source URL: www.daemonology.net

      Language: English - Date: 2009-06-11 07:30:54
      89Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / NIST hash function competition / SHA-3 / Secure Hash Algorithm / SHA-2 / SHA-1 / Secure Hash Standard / Crypt / Hash function

      Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-09-24 10:22:35
      90

      Lattice-Based Cryptography: Trapdoors, Discrete Gaussians, and Applications Chris Peikert Georgia Institute of Technology crypt@b-it 2013

      Add to Reading List

      Source URL: web.eecs.umich.edu

      Language: English - Date: 2015-09-08 16:31:59
        UPDATE