Cryptographic software

Results: 2705



#Item
621Checksum / Electronic Common Technical Document / MD5 / Cryptographic hash function / Cksum / Sum / Simple file verification / Computing / Software / Unix

Microsoft Word - File Security - MD5 v1_0-hwm.doc

Add to Reading List

Source URL: estri.ich.org

Language: English - Date: 2012-06-04 19:13:02
622Cryptographic hash functions / Cross-platform software / Advanced Encryption Standard / Reconfigurable video coding / Programming paradigms / Dataflow programming / SHA-2 / AES implementations / SHA-1 / Computing / Electronic engineering / Hardware description languages

CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm (Extended Edition)? Junaid Jameel Ahmad1 , Shujun Li1,2 , Ahmad-Reza Sadeghi3,4 , and Thomas Schneider3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-21 10:33:05
623Cryptography / Cryptographic protocols / Cryptographic software / Computer network security / Password / Security / Computer security

Microsoft Word - Comments of an efficient and secure multi-server authentication scheme with key agreement.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-01 21:27:53
624Key management / Cryptographic protocols / Passphrase / Password / PBKDF2 / Crypt / Key / Transport Layer Security / Encrypting File System / Cryptography / Cryptographic software / Disk encryption

High Security Online Backup A Cyphertite White Paper February, 2013 Cryptography

Add to Reading List

Source URL: www.cyphertite.com

Language: English - Date: 2013-03-25 09:52:17
625United States Department of Commerce / Export Control Classification Number / International trade / Technology / Cryptographic software / Key management / 56-bit encryption / Export / Cryptography / Security / Identifiers / Military technology

Federal Register / Vol. 67, NoThursday, June 6, Rules and Regulations Note 2: Information concerning the existence of approved alternative methods of compliance with this airworthiness directive, if any, m

Add to Reading List

Source URL: www.cyber.com

Language: English - Date: 2013-08-13 11:07:10
626Proof theory / Applied mathematics / Proof of knowledge / Deduction / Zero-knowledge proof / Complexity classes / IP / Soundness / NP / Cryptography / Mathematics / Cryptographic protocols

Resettably-Sound Resettable Zero Knowledge Arguments for NP ? Yi Deng State Key Laboratory of Information Security,Institute of Software, Chinese Academy of Sciences, Beijing, 100190, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-02-19 03:37:24
627Obfuscation / Cryptographic software / Law / Copy protection / Digital rights management / Obfuscated code / Encryption / Software cracking / Source code / Warez / Computing / Computer programming

Security That Works Printer friendly version .NET Intellectual Property Protection The Merits of “True Encryption”

Add to Reading List

Source URL: www.crypkey.com

Language: English - Date: 2014-11-24 15:33:32
628Cryptographic software / Secure Shell / Ssh-keygen / OpenSSH / Ssh-agent / Comparison of SSH clients / Comparison of SSH servers / Telnet / File Transfer Protocol / Software / System software / Computing

AUUG Winter 2002 SSH tips, tricks & protocol tutorial Damien Miller () AugustContents

Add to Reading List

Source URL: www.mindrot.org

Language: English - Date: 2003-06-03 18:37:14
629Malware / OO / Tor / Badbunny / Cryptographic primitive / Macintosh / Software / Portable software / OpenOffice.org

OpenOffice v3.x Security Design Weaknesses Eric Filiol

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
630Expect / Cryptography / Computer security / Password fatigue / Password strength / Password / Security / Cryptographic software

Microsoft PowerPoint - OpenClinica 3.1 Module A Intro to OpenClinica SITES v1.0 Apr2012.pptx

Add to Reading List

Source URL: ctc.usyd.edu.au

Language: English - Date: 2013-05-19 21:54:53
UPDATE