Strong cryptography

Results: 135



#Item
111Computer crimes / Password / Cryptographic software / Roboform / Phishing / LastPass Password Manager / Keystroke logging / Password policy / Password strength / Security / Cryptography / Computer security

Tips to Create and Manage Strong Passwords from ConnectSafely.org A strong password is your first line of defense against intruders and imposters. Never give out your password to anyone (except your parents). Never give

Add to Reading List

Source URL: www.connectsafely.org

Language: English - Date: 2013-06-05 13:47:54
112Cipher / SHA-1 / Cryptanalysis / Key size / Cryptosystem / Strong cryptography / Cryptography / Mathematical sciences / Science

Draft revision: 3f5ad4f[removed]:38:47 +0200) Pepi Zawodsky Applied Crypto Hardening Wolfgang Breyha, David Durvaux, Tobias Dussa, L. Aaron Kaplan, Florian Mendel, Christian Mock, Manuel Koschuch, Adi Kriegisch, U

Add to Reading List

Source URL: bettercrypto.org

Language: English - Date: 2014-06-21 11:07:34
113Internet privacy / Cryptographic software / Pretty Good Privacy / Phil Zimmermann / Encryption / Internet security / Cipher / Whitfield Diffie / Strong cryptography / Cryptography / Public-key cryptography / Cypherpunks

An Introduction to Cryptography Copyright © 1990–2000 Network Associates, Inc. and its Affiliated Companies. All Rights Reserved. PGP*, Version 7.0

Add to Reading List

Source URL: www.pgpkeys.org

Language: English - Date: 2006-08-22 14:35:54
114Authentication / Notary / Packaging / Cloud computing / Two-factor authentication / Security token / Security / Cryptography / Access control

THE REAL COST OF STRONG AUTHENTICATION Assessing the Real Cost of Strong Authentication by comparing the Total Cost of Operation of On-Premise vs. Cloud-Based Authentication Solutions RIGHT

Add to Reading List

Source URL: www2.safenet-inc.com

Language: English - Date: 2013-03-19 10:42:07
115Finite fields / Cryptographic protocols / Homomorphic encryption / Diffie–Hellman problem / Strong RSA assumption / RSA / Elliptic curve cryptography / Actor model / Eurocrypt / Cryptography / Public-key cryptography / Computational hardness assumptions

Victor Shoup Curriculum Vitae Feb. 6, 2014 Department of Computer Science Courant Institute of Mathematical Sciences New York University 251 Mercer Street

Add to Reading List

Source URL: www.shoup.net

Language: English - Date: 2014-02-06 21:21:47
116Thawte / X.509 / Root certificate / Certificate authority / Public key certificate / Code signing / Public key infrastructure / Verisign / Trusted third party / Cryptography / Public-key cryptography / Key management

Thawte Code Signing Certificates ® Deliver Software Securely and Reliably for Less Thawte® Code Signing Certificates offer strong protection and rigorous verification for

Add to Reading List

Source URL: www.thawte.de

Language: English - Date: 2012-05-10 17:51:37
117Privacy / Radio-frequency identification / Wireless / Technology / Computing / ISO/IEC / Password authentication protocol / ISO/IEC 18000-3 / Message authentication codes / Cryptography / Automatic identification and data capture

Secure UHF Tags with Strong Cryptography Development of ISO/IEC[removed]Compatible Secure RFID Tags and Presentation of First Results Walter Hinz, Klaus Finkenzeller and Martin Seysen Giesecke & Devrient GmbH, Prinzrege

Add to Reading List

Source URL: www.rfid-handbook.de

Language: English - Date: 2013-04-26 03:48:58
118Radio-frequency identification / RSA / Cryptosystem / Digital signature / Cryptographic protocol / Index of cryptography articles / Schmidt–Samoa cryptosystem / Cryptography / Public-key cryptography / Rabin cryptosystem

Secure UHF Tags with Strong Cryptography Development of ISO/IEC[removed]Compatible Secure RFID Tags and Presentation of First Results Walter Hinz, Klaus Finkenzeller, Martin Seysen Barcelona, February 19th, 2013

Add to Reading List

Source URL: www.rfid-handbook.de

Language: English - Date: 2013-04-26 03:50:36
119Password / Crack / Password policy / Password strength / Computer security / Security / Cryptography

PASSWORD HELPFUL HINTS What is a strong password? While experts differ on their opinion of a strong password, if you stick to these rules of thumb, your passwords will be plenty strong. There are six main characteristics

Add to Reading List

Source URL: www.kentlandbank.com

Language: English - Date: 2012-01-02 09:49:41
120Export Administration Act / Computer law / International trade / Business / Military science / Export / Strong cryptography / United States Munitions List / Export of cryptography in the United States / Identifiers / Military technology / United States Department of Commerce

58767 Federal Register

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2010-12-01 21:18:08
UPDATE