DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Crypt (C)

Crypt (C)

  • GPU-Based Password Cracking on the Security of Password Hashing Schemes Regarding Advances in Graphics Processing Units

    GPU-Based Password Cracking on the Security of Password Hashing Schemes Regarding Advances in Graphics Processing Units

  • Implementation and Performance Analysis of PBKDF2, Bcrypt, Scrypt Algorithms

    Implementation and Performance Analysis of PBKDF2, Bcrypt, Scrypt Algorithms

  • Speeding up Linux Disk Encryption Ignat Korchagin @Ignatkn $ Whoami

    Speeding up Linux Disk Encryption Ignat Korchagin @Ignatkn $ Whoami

  • Forgery and Key Recovery Attacks for Calico

    Forgery and Key Recovery Attacks for Calico

  • How to Handle Rainbow Tables with External Memory

    How to Handle Rainbow Tables with External Memory

  • Securing Audio Using AES-Based Authenticated Encryption with Python

    Securing Audio Using AES-Based Authenticated Encryption with Python

  • Implementation and Performance Analysis of PBKDF2, Bcrypt, Scrypt Algorithms

    Implementation and Performance Analysis of PBKDF2, Bcrypt, Scrypt Algorithms

  • Optimizing Authenticated Encryption Algorithms

    Optimizing Authenticated Encryption Algorithms

  • Optimizing Dm-Crypt for XTS-AES: Getting the Best of Atmel Cryptographic Co-Processors

    Optimizing Dm-Crypt for XTS-AES: Getting the Best of Atmel Cryptographic Co-Processors

  • Breaking the Crypt

    Breaking the Crypt

  • Just in Time Hashing

    Just in Time Hashing

  • The Mathematics of Cryptology

    The Mathematics of Cryptology

  • Cryptacus Newsletter

    Cryptacus Newsletter

  • Lab 3B Hashing Implementation This Lab Outlines Some Implementations for Hashing Methods

    Lab 3B Hashing Implementation This Lab Outlines Some Implementations for Hashing Methods

  • Lecture 9: Using Block and Stream Ciphers for Secure Wired and Wifi Communications

    Lecture 9: Using Block and Stream Ciphers for Secure Wired and Wifi Communications

  • 1 Passlib 1.8.0.Dev0 Documentation3 1.1 Welcome

    1 Passlib 1.8.0.Dev0 Documentation3 1.1 Welcome

  • Better Bounds for Block Cipher Modes of Operation Via Nonce-Based Key Derivation

    Better Bounds for Block Cipher Modes of Operation Via Nonce-Based Key Derivation

  • Practical Cryptographic Data Integrity Protection with Full Disk Encryption Extended Version

    Practical Cryptographic Data Integrity Protection with Full Disk Encryption Extended Version

Top View
  • A Review of NTLM Rainbow Table Generation Techniques
  • MICROSAR Cyber Security
  • Rainbow Tables & Rainbowcrack Introduction
  • 1Password Security Design White Paper
  • Steg Crypt (Encryption Using Steganography)
  • Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
  • Devconf 2017
  • Web App Cryptology a Study in Failure
  • Nails in the Crypt(3)
  • STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL 1. Introduction Password-Based Key Derivation Functi
  • Introduction to Cryptography
  • A Survey of Asynchronous Extensions of Block Cipher Modes of Operation
  • OWASP Threat Model for Secure Password Storage Is Psart of the Appsec Knowledge Series
  • STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL 1. Introduction Password-Based Key Derivation Functi
  • History-Free Aggregate Message Authentication Codes
  • AES Cipher Modes with EFM32
  • Cryptographic Technology Guideline (Lightweight Cryptography)
  • A Future-Adaptable Password Scheme


© 2024 Docslib.org    Feedback