PBKDF2

Results: 49



#Item
21Softraid: OpenBSD’s virtual HBA, with benefits Marco Peereboom OpenBSD The transformations are arbitrarily complex and span a wide range of uses. For example, a discipline could mirror an I/O, stripe an I/O or encrypt

Softraid: OpenBSD’s virtual HBA, with benefits Marco Peereboom OpenBSD The transformations are arbitrarily complex and span a wide range of uses. For example, a discipline could mirror an I/O, stripe an I/O or encrypt

Add to Reading List

Source URL: openbsd.comstyle.com

Language: English - Date: 2010-03-17 04:09:19
22Softraid: OpenBSD’s virtual HBA, with benefits Marco Peereboom OpenBSD The transformations are arbitrarily complex and span a wide range of uses. For example, a discipline could mirror an I/O, stripe an I/O or encrypt

Softraid: OpenBSD’s virtual HBA, with benefits Marco Peereboom OpenBSD The transformations are arbitrarily complex and span a wide range of uses. For example, a discipline could mirror an I/O, stripe an I/O or encrypt

Add to Reading List

Source URL: www.obsd.si

Language: English - Date: 2010-03-17 04:09:19
23September 2014
 Version v1.8

September 2014
 Version v1.8" ! Thank you for your interest in PasswordBox. On the following pages, you’ll find a

Add to Reading List

Source URL: www.passwordbox.com

Language: English - Date: 2014-09-10 15:03:40
24Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption Omar Choudary University of Cambridge  Felix Gr¨obert ∗

Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption Omar Choudary University of Cambridge Felix Gr¨obert ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-07-21 17:47:00
25High Security Online Backup  A Cyphertite White Paper February, 2013  Cryptography

High Security Online Backup A Cyphertite White Paper February, 2013 Cryptography

Add to Reading List

Source URL: www.cyphertite.com

Language: English - Date: 2013-03-25 09:52:17
26Programming Assignment 1  Winter 2015 CS 255: Intro to Cryptography Due Feb. 13, 11:59pm

Programming Assignment 1 Winter 2015 CS 255: Intro to Cryptography Due Feb. 13, 11:59pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-02 11:42:01
27A Working Intro to Cryptography Illustrated with Python Kyle Isom

A Working Intro to Cryptography Illustrated with Python Kyle Isom

Add to Reading List

Source URL: samples.leanpub.com

Language: English - Date: 2014-02-07 22:13:09
28Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs Marcos A. Simplicio Jr., Leonardo C. Almeida, Ewerton R. Andrade, Paulo C. F. dos Santos, and Paulo S. L. M. Barreto Escola Polit´ecni

Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs Marcos A. Simplicio Jr., Leonardo C. Almeida, Ewerton R. Andrade, Paulo C. F. dos Santos, and Paulo S. L. M. Barreto Escola Polit´ecni

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-27 11:02:00
29MBS Xojo Encryption Kit
 Version 1.0, © [removed]by Christian Schmitz About the MBS Xojo Encryption Kit  2

MBS Xojo Encryption Kit
 Version 1.0, © [removed]by Christian Schmitz About the MBS Xojo Encryption Kit 2

Add to Reading List

Source URL: www.monkeybreadsoftware.de

Language: English - Date: 2015-03-17 06:27:44