Crypt

Results: 686



#Item
81CGI Programming with Perl #!/usr/bin/perl # It Came From the Crypt!  $q=

CGI Programming with Perl #!/usr/bin/perl # It Came From the Crypt! $q=

Add to Reading List

Source URL: www.perltraining.com.au

Language: English - Date: 2005-08-01 23:49:40
82How to prevent type-flaw guessing attacks on password protocols Sreekanth Malladi and Jim Alves-Foss University of Idaho, USA. June 22, 2003

How to prevent type-flaw guessing attacks on password protocols Sreekanth Malladi and Jim Alves-Foss University of Idaho, USA. June 22, 2003

Add to Reading List

Source URL: www.qatar.cmu.edu

Language: English - Date: 2004-12-05 23:21:27
83Lattice-Based Cryptography: Ring-Based Primitives and Open Problems Chris Peikert Georgia Institute of Technology  crypt@b-it 2013

Lattice-Based Cryptography: Ring-Based Primitives and Open Problems Chris Peikert Georgia Institute of Technology crypt@b-it 2013

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2015-09-08 16:32:01
    84c de Gruyter 2007 
 DOIJMCJ. Math. Crypt), 1–16

    c de Gruyter 2007 DOIJMCJ. Math. Crypt), 1–16

    Add to Reading List

    Source URL: www.isical.ac.in

    Language: English - Date: 2011-12-28 03:46:39
      85Protecting Users Against XSS-based Password Manager Abuse Ben Stock Martin Johns

      Protecting Users Against XSS-based Password Manager Abuse Ben Stock Martin Johns

      Add to Reading List

      Source URL: dl.dropboxusercontent.com

      Language: English
      86Measuring Real-World Accuracies and Biases in Modeling Password Guessability Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek† , Willi

      Measuring Real-World Accuracies and Biases in Modeling Password Guessability Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek† , Willi

      Add to Reading List

      Source URL: www.blaseur.com

      Language: English - Date: 2015-08-12 14:36:57
      87Very-efficient flipping of many coins (between two parties) Luís T. A. N. Brandão University of Lisbon and Carnegie Mellon University

      Very-efficient flipping of many coins (between two parties) Luís T. A. N. Brandão University of Lisbon and Carnegie Mellon University

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2014-03-01 16:01:06
      88scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

      scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

      Add to Reading List

      Source URL: www.daemonology.net

      Language: English - Date: 2009-06-11 07:30:54
      89Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection

      Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-09-24 10:22:35
      90Lattice-Based Cryptography: Trapdoors, Discrete Gaussians, and Applications Chris Peikert Georgia Institute of Technology  crypt@b-it 2013

      Lattice-Based Cryptography: Trapdoors, Discrete Gaussians, and Applications Chris Peikert Georgia Institute of Technology crypt@b-it 2013

      Add to Reading List

      Source URL: web.eecs.umich.edu

      Language: English - Date: 2015-09-08 16:31:59