Strong cryptography

Results: 135



#Item
21Mathematics / Applied mathematics / Information theory / Random number generation / Entropy / Modular arithmetic / Key management / Linear congruential generator / Pseudo-ring / Cryptography / Pseudorandom number generators / Randomness

Random Number Generators: Introduction for Operating System Developers Key material generation is as important to strong cryptosystems as the algorithms used. Weak random number generators (RNGs) have been known to creat

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-07-17 09:45:36
22RSA / Random oracle / Optimal asymmetric encryption padding / Digital signature / Strong RSA assumption / Cryptographic hash function / Index of cryptography articles / Lamport signature / Cryptography / Public-key cryptography / Full Domain Hash

On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis1 , Iftach Haitner2⋆ , and Aris Tentes1 1 2

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2013-06-11 04:12:51
23Public-key cryptography / Cryptography standards / Cryptographic software / Security token / Fortinet / PKCS / Smart card / Universal Serial Bus / Microsoft CryptoAPI / Cryptography / Computing / Computer security

FortiToken -300 TM One-Time Password Token Strong Authentication at your Fingertips The FortiToken-300 product comprises a hardware token (FortiToken-300 PKI USB

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:15:10
24One-time password / Fortinet / Two-factor authentication / Password / Random password generator / Security / Computer security / Cryptography

FortiToken -200CD TM One-Time Password Token Strong Authentication at Your Fingertips The OATH compliant, time-based One-Time-Password (OTP) FortiToken-200CD is

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:15:06
25One-time password / Fortinet / Two-factor authentication / Password / Random password generator / Security / Computer security / Cryptography

FortiToken -200CD TM One-Time Password Token Strong Authentication at Your Fingertips The OATH compliant, time-based One-Time-Password (OTP) FortiToken-200CD is

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:06
26Public-key cryptography / Cryptography standards / Cryptographic software / Security token / Fortinet / PKCS / Smart card / Universal Serial Bus / Microsoft CryptoAPI / Cryptography / Computing / Computer security

FortiToken -300 TM One-Time Password Token Strong Authentication at your Fingertips The FortiToken-300 product comprises a hardware token (FortiToken-300 PKI USB

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:10
27One-time password / Security token / Fortinet / Two-factor authentication / Password / TOTP / Transaction authentication number / Random password generator / Forensic Toolkit / Computer security / Security / Cryptography

FortiToken -200 TM One-Time Password Token Strong Authentication at Your Fingertips The OATH compliant, time-based One-Time-Password (OTP) FortiToken-200 is

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:15:11
28One-time password / Security token / Fortinet / Two-factor authentication / Password / TOTP / Transaction authentication number / Random password generator / Forensic Toolkit / Computer security / Security / Cryptography

FortiToken -200 TM One-Time Password Token Strong Authentication at Your Fingertips The OATH compliant, time-based One-Time-Password (OTP) FortiToken-200 is

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:11
29Cryptography / Password / Password policy / Password strength / Passphrase / Phishing / Security / Computer security / Access control

SET AND USE STRONG PASSWORDS Passwords and PINs are used to identify who you are. Sometimes they are the only defense to protect your information against unauthorized access. If your password or PIN is captured, guessed

Add to Reading List

Source URL: www.am-win.com.au

Language: English - Date: 2015-03-30 01:32:32
30Password / One-time password / Authentication / Cryptography / Password strength / Password policy / Security / Computer security / Access control

Weak and strong passwords When to use them and how to protect them Prof Audun Jøsang

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-07 02:48:00
UPDATE