DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Crypt (C)
Crypt (C)
GPU-Based Password Cracking on the Security of Password Hashing Schemes Regarding Advances in Graphics Processing Units
Implementation and Performance Analysis of PBKDF2, Bcrypt, Scrypt Algorithms
Speeding up Linux Disk Encryption Ignat Korchagin @Ignatkn $ Whoami
Forgery and Key Recovery Attacks for Calico
How to Handle Rainbow Tables with External Memory
Securing Audio Using AES-Based Authenticated Encryption with Python
Implementation and Performance Analysis of PBKDF2, Bcrypt, Scrypt Algorithms
Optimizing Authenticated Encryption Algorithms
Optimizing Dm-Crypt for XTS-AES: Getting the Best of Atmel Cryptographic Co-Processors
Breaking the Crypt
Just in Time Hashing
The Mathematics of Cryptology
Cryptacus Newsletter
Lab 3B Hashing Implementation This Lab Outlines Some Implementations for Hashing Methods
Lecture 9: Using Block and Stream Ciphers for Secure Wired and Wifi Communications
1 Passlib 1.8.0.Dev0 Documentation3 1.1 Welcome
Better Bounds for Block Cipher Modes of Operation Via Nonce-Based Key Derivation
Practical Cryptographic Data Integrity Protection with Full Disk Encryption Extended Version
Top View
A Review of NTLM Rainbow Table Generation Techniques
MICROSAR Cyber Security
Rainbow Tables & Rainbowcrack Introduction
1Password Security Design White Paper
Steg Crypt (Encryption Using Steganography)
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
Devconf 2017
Web App Cryptology a Study in Failure
Nails in the Crypt(3)
STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL 1. Introduction Password-Based Key Derivation Functi
Introduction to Cryptography
A Survey of Asynchronous Extensions of Block Cipher Modes of Operation
OWASP Threat Model for Secure Password Storage Is Psart of the Appsec Knowledge Series
STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL 1. Introduction Password-Based Key Derivation Functi
History-Free Aggregate Message Authentication Codes
AES Cipher Modes with EFM32
Cryptographic Technology Guideline (Lightweight Cryptography)
A Future-Adaptable Password Scheme