Derivation

Results: 734



#Item
91

From Rankine-Hugoniot Condition to a Constructive Derivation of HDG Methods Tan Bui-Thanh Abstract This chapter presents a constructive derivation of HDG methods for convection-diffusion-reaction equation using the Ranki

Add to Reading List

Source URL: users.ices.utexas.edu

Language: English - Date: 2015-04-28 12:00:56
    92Cryptography / Salt / Password / Cryptographic hash function / Crypt / Hash function / Random password generator / PBKDF2 / Key derivation function / Key / Bcrypt / Scrypt

    The M AKWA Password Hashing Function Specifications v1.1 Thomas Pornin, <> April 22, 2015 Abstract

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2015-04-27 09:52:37
    93

    Logistic Regression Jason Rennie April 23, 2003 Abstract This document gives the derivation of logistic regression with and

    Add to Reading List

    Source URL: people.csail.mit.edu

    Language: English - Date: 2003-05-05 10:54:38
      94Cryptography / Key management / Cryptographic software / Bcrypt / Scrypt / Crypt / Key stretching / Password cracking / Key derivation function / Blowfish / Block cipher / Password

      battcrypt (Blowfish All The Things) Steven Thomas (steve at tobtu dot com) Specification Symbols/functions **

      Add to Reading List

      Source URL: password-hashing.net

      Language: English - Date: 2014-04-03 12:34:12
      95Cryptography / Key management / Cryptographic hash functions / Feistel cipher / Key stretching / Block cipher / Crypt / Scrypt / Password / Key derivation function / Data Encryption Standard / Key

      Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographic

      Add to Reading List

      Source URL: password-hashing.net

      Language: English - Date: 2014-04-03 12:37:38
      96Computing / Concurrent computing / Parallel computing / GPGPU / Computer architecture / Video cards / Graphics hardware / Cryptography / Key derivation function / Scrypt / Brute-force attack / Password cracking

      Security of Key Derivation Functions Ewerton Rodrigues Andrade Advisor: Prof. Dr. Marcos Antonio Simplicio Junior ´

      Add to Reading List

      Source URL: lyra2.net

      Language: English - Date: 2014-01-07 11:26:38
      97Cryptography / Cryptographic hash functions / Search algorithms / Key management / Hashing / Scrypt / Salt / Password / Hash function / Crypt / Key derivation function / SHA-2

      TwoCats (and SkinnyCat): A Compute Time and Sequential Memory Hard Password Hashing Scheme Bill Cox

      Add to Reading List

      Source URL: password-hashing.net

      Language: English - Date: 2014-04-03 12:39:48
      98Cryptography / Hash function / Crypt / Key derivation function / Salt / Password / Pomelo / Key

      POMELO A Password Hashing Algorithm (Version 2) Designer and Submitter: Hongjun Wu Division of Mathematical Sciences Nanyang Technological University

      Add to Reading List

      Source URL: password-hashing.net

      Language: English - Date: 2015-04-14 02:03:17
      99

      Supporting InformationpnasHere, we present a more self-contained derivation of the fitness-flux theorem and describe the numerical simulations presented in the main text. Genotype and Allele Frequenci

      Add to Reading List

      Source URL: www.thp.uni-koeln.de

      Language: English - Date: 2010-07-27 11:48:47
        100Cryptography / Key management / Cryptographic hash functions / Key derivation function / PBKDF2 / Password cracking / Password / Key stretching / Salt / Scrypt / Crypt / Key

        The Catena Password-Scrambling Framework Christian Forler∗ Stefan Lucks†

        Add to Reading List

        Source URL: password-hashing.net

        Language: English - Date: 2015-09-29 12:17:24
        UPDATE