PBKDF2

Results: 49



#Item
21SCSI / C dynamic memory allocation / PBKDF2 / Computing / RAID / Computer architecture

Softraid: OpenBSD’s virtual HBA, with benefits Marco Peereboom OpenBSD The transformations are arbitrarily complex and span a wide range of uses. For example, a discipline could mirror an I/O, stripe an I/O or encrypt

Add to Reading List

Source URL: openbsd.comstyle.com

Language: English - Date: 2010-03-17 04:09:19
22SCSI / C dynamic memory allocation / PBKDF2 / Computing / RAID / Computer architecture

Softraid: OpenBSD’s virtual HBA, with benefits Marco Peereboom OpenBSD The transformations are arbitrarily complex and span a wide range of uses. For example, a discipline could mirror an I/O, stripe an I/O or encrypt

Add to Reading List

Source URL: www.obsd.si

Language: English - Date: 2010-03-17 04:09:19
23Cryptographic software / Computer network security / Password / Windows / Two-factor authentication / Internet security / Cipher suite / Salt / PBKDF2 / Security / Computer security / Cryptography

September 2014
 Version v1.8" ! Thank you for your interest in PasswordBox. On the following pages, you’ll find a

Add to Reading List

Source URL: www.passwordbox.com

Language: English - Date: 2014-09-10 15:03:40
24Software / Computing / FileVault / BitLocker Drive Encryption / TrueCrypt / PBKDF2 / Encryption software / NTFS / Keychain / Cryptography / Disk encryption / Cryptographic software

Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption Omar Choudary University of Cambridge Felix Gr¨obert ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-07-21 17:47:00
25Key management / Cryptographic protocols / Passphrase / Password / PBKDF2 / Crypt / Key / Transport Layer Security / Encrypting File System / Cryptography / Cryptographic software / Disk encryption

High Security Online Backup A Cyphertite White Paper February, 2013 Cryptography

Add to Reading List

Source URL: www.cyphertite.com

Language: English - Date: 2013-03-25 09:52:17
26Cryptographic software / Cryptographic hash functions / Key management / Password / Keychain / Salt / KeePass / Rainbow table / PBKDF2 / Cryptography / Software / Computer security

Programming Assignment 1 Winter 2015 CS 255: Intro to Cryptography Due Feb. 13, 11:59pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-02 11:42:01
27Padding / Initialization vector / Block cipher / Symmetric-key algorithm / Cipher / Block size / Advanced Encryption Standard / PBKDF2 / Crypt / Cryptography / Stream cipher / Ciphertext

A Working Intro to Cryptography Illustrated with Python Kyle Isom

Add to Reading List

Source URL: samples.leanpub.com

Language: English - Date: 2014-02-07 22:13:09
28Search algorithms / Hashing / Password cracking / PBKDF2 / Salt / Password / Hash function / Crypt / Key derivation function / Cryptography / Cryptographic hash functions / Key management

Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs Marcos A. Simplicio Jr., Leonardo C. Almeida, Ewerton R. Andrade, Paulo C. F. dos Santos, and Paulo S. L. M. Barreto Escola Polit´ecni

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-27 11:02:00
29Hashing / Key management / PBKDF2 / SHA-2 / HMAC / Crypt / MD5 / Password / Key / Cryptography / Error detection and correction / Cryptographic hash functions

MBS Xojo Encryption Kit
 Version 1.0, © [removed]by Christian Schmitz About the MBS Xojo Encryption Kit 2

Add to Reading List

Source URL: www.monkeybreadsoftware.de

Language: English - Date: 2015-03-17 06:27:44
UPDATE