Strong cryptography

Results: 135



#Item
51Cryptography / Password / Password policy / Password strength / Roboform / Security / Access control / Computer security

Tip Sheet Creating strong, safe passwords Ensuring the security of multiple online accounts might seem like a big task, but it’s really important you don’t use the same password for everything. Data breaches of well

Add to Reading List

Source URL: www.accan.org.au

Language: English - Date: 2015-03-05 20:32:16
52Internet / Computing / Internet protocols / Internet standards / HTTP / HTTP Secure / HTTP cookie / Man-in-the-middle attack / Certificate authority / Cryptography / Cryptographic protocols / Secure communication

Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web Michael Dietz Rice University Alexei Czeskis

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-03-21 17:06:14
53Government / Security / CrimTrac / Police certificate / Background check / Public key certificate / Cryptography / Criminal records / Public records

Probity in Employment Policy for FACS funded disability service providers Summary: This policy is designed to promote a strong culture of probity in employment of persons (paid or unpaid) involved in delivering services

Add to Reading List

Source URL: www.adhc.nsw.gov.au

Language: English - Date: 2014-12-10 19:40:17
54Two-factor authentication / Security token / Authentication / Intelligent Nation / One-time password / Strong authentication / Password / Federated identity / Anakam / Security / Cryptography / Computer security

FACT SHEET (May[removed]National Authentication Framework The National Authentication Framework (NAF) seeks to realise the vision of the iN2015 masterplan for a secure and trusted enabling infocomm infrastructure that can

Add to Reading List

Source URL: www.ida.gov.sg

Language: English - Date: 2012-10-04 21:31:28
55Government / Security / CrimTrac / Police certificate / Background check / Public key certificate / Developmental disability / Disability / Cryptography / Criminal records / Public records

Probity in Employment Policy for FACS funded disability service providers Summary: This policy is designed to promote a strong culture of probity in employment of persons (paid or unpaid) involved in delivering services

Add to Reading List

Source URL: www.adhc.nsw.gov.au

Language: English - Date: 2014-12-02 00:38:53
56Cryptography / Password / Cryptographic software / Roboform / Password policy / LastPass Password Manager / Password strength / Security / Computer security / Access control

Tip Sheet Creating strong, safe passwords Ensuring the security of multiple online accounts might seem like a big task, but it’s really important you don’t use the same password for everything. Data breaches of well

Add to Reading List

Source URL: accan.org.au

Language: English - Date: 2015-03-05 20:32:56
57Cryptography / Password / Password policy / Password strength / Roboform / Security / Access control / Computer security

Tip Sheet Creating strong, safe passwords Ensuring the security of multiple online accounts might seem like a big task, but it’s really important you don’t use the same password for everything. Data breaches of well

Add to Reading List

Source URL: accan.org.au

Language: English - Date: 2015-03-05 20:32:16
58Key / RSA / Advantage / Chosen-plaintext attack / Random oracle / Randomness / Probabilistic encryption / Ciphertext indistinguishability / Cryptography / Randomness extractor / Strong secrecy

Randomness in Cryptography Febuary 25, 2013 Lecture 8: Cryptography in the presence of local/public randomness Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:31
59Pseudoprimes / Modular arithmetic / Abstract algebra / Miller–Rabin primality test / Solovay–Strassen primality test / Probable prime / Fermat primality test / Prime number / Strong pseudoprime / Mathematics / Number theory / Primality tests

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
60Key size / Data Encryption Standard / Brute-force attack / Strong cryptography / Symmetric-key algorithm / 40-bit encryption / XSL attack / Cryptography / Advanced Encryption Standard / Key management

About AES – Advanced Encryption Standard A short introduction[removed]Copyright 2007 Svante Seleborg Axantum Software AB A short introduction to AES, the most common algorithm for current implementations of informat

Add to Reading List

Source URL: www.axantum.com

Language: English - Date: 2014-05-04 18:08:46
UPDATE