Sha

Results: 7306



#Item
211

THE DISC OF THE MILKY WAY G. Iafrate, M. Ramella INAF - Astronomical Observatory of Trieste Information and contacts: http://vo-for-education.oats.inaf.it - Within this use case you discover the sha

Add to Reading List

Source URL: svn.ari.uni-heidelberg.de

Language: English - Date: 2015-06-23 06:52:26
    212Cryptography / Cryptographic hash functions / Hashing / Cryptographic software / Key management / Crypt / Scrypt / SHA-2 / Password / Hash function / PBKDF2 / Salt

    Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2014-10-16 08:19:35
    213

    menu_SHA_2016_maijs_trim-2.pdf

    Add to Reading List

    Source URL: www.steikuhaoss.lv

    Language: Latvian - Date: 2016-05-03 15:18:02
      214

      The characteristics of antenna system in Chinese Spectral Radio Heliograph Sha Li*1,Yi Hua Yan1, Zhi Jun Chen1 and Wei Wang1 1 Key Laboratory of Solar Activity, National Astronomical Observatories, Chinese Academy of

      Add to Reading List

      Source URL: mos.bao.ac.cn

      Language: English - Date: 2015-07-20 22:08:00
        215Cryptography / Cryptographic hash functions / NIST hash function competition / SHA-3 / Sponge function / Password / Crypt / Hash function / Exclusive or / Key derivation function / Lyra2

        Gambit A sponge based, memory hard key derivation function Krisztián Pintér ()  Pseudocode S

        Add to Reading List

        Source URL: password-hashing.net

        Language: English - Date: 2014-04-14 07:18:05
        216Cryptography / Cryptographic hash functions / Password / Security / Crypt / SHA-1 / Encryption / Database encryption

        Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

        Add to Reading List

        Source URL: www.estv.admin.ch

        Language: English
        217

        Cryptanalysis of Dynamic SHA(2) Jean-Philippe Aumasson1,∗ , Orr Dunkelman2,† , Sebastiaan Indesteege3,4,‡ , and Bart Preneel3,4 1 FHNW, Windisch, Switzerland. ´

        Add to Reading List

        Source URL: 131002.net

        Language: English - Date: 2012-08-14 06:46:39
          218

          SHA-3: should we care? Jean-Philippe Aumasson 2005 SHA-1

          Add to Reading List

          Source URL: 131002.net

          - Date: 2012-11-03 16:39:32
            219

            Collisions for Step-Reduced SHA-256 Ivica Nikoli´c and Alex Biryukov University of Luxembourg {ivica.nikolic,alex.biryukov}@uni.lu Abstract. In this article we find collisions for step-reduced SHA-256.

            Add to Reading List

            Source URL: www.cryptolux.org

            Language: English
              220Cryptography / Secure communication / Cryptographic hash functions / Cryptographic protocols / Hashing / Transport Layer Security / Collision attack / Cipher suite / MD5 / OpenSSL / SHA-2 / Man-in-the-middle attack

              Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

              Add to Reading List

              Source URL: mitls.org

              Language: English - Date: 2016-01-06 07:34:05
              UPDATE