PBKDF2

Results: 49



#Item
31scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2015-01-21 18:21:31
32Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: •

Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: •

Add to Reading List

Source URL: www.dashlane.com

Language: English - Date: 2014-12-08 17:29:08
33Rig: A simple, secure and flexible design for Password Hashing Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India {donghoon,arpanj,swe

Rig: A simple, secure and flexible design for Password Hashing Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India {donghoon,arpanj,swe

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-07 03:55:02
34Cryptographic Module for CipherCloud Gateway Version 1.0 FIPS[removed]Level 1 Security Policy Version Number: 1.8 Date: August 14, 2014

Cryptographic Module for CipherCloud Gateway Version 1.0 FIPS[removed]Level 1 Security Policy Version Number: 1.8 Date: August 14, 2014

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-18 14:40:42
35RSA BSAFE Crypto-C Micro Edition[removed]Security Policy

RSA BSAFE Crypto-C Micro Edition[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-24 12:10:48
36FSCLM PPC Security Policy

FSCLM PPC Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
37FSCLM PPC Security Policy

FSCLM PPC Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
38CGDCONFIG (8)  NetBSD System Manager’s Manual CGDCONFIG (8)

CGDCONFIG (8) NetBSD System Manager’s Manual CGDCONFIG (8)

Add to Reading List

Source URL: www.imrryr.org

Language: English - Date: 2004-02-26 15:48:53
39“Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd. {a.belenko, d.sklyarov} @ elcomsoft . com http://www.elcomsoft.com

“Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd. {a.belenko, d.sklyarov} @ elcomsoft . com http://www.elcomsoft.com

Add to Reading List

Source URL: www.elcomsoft.com

Language: English - Date: 2014-01-15 02:15:56
40Programming Assignment 2  Winter 2014 CS 255: Intro to Cryptography Due Feb. 21, 11:59pm

Programming Assignment 2 Winter 2014 CS 255: Intro to Cryptography Due Feb. 21, 11:59pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-02-07 16:58:58