Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,378,800 papers from all fields of science
Search
Sign In
Create Free Account
Crypt (Unix)
Known as:
Crypt (disambiguation)
In Unix computing, crypt is a utility program used for encryption. Due to the ease of breaking it, it is considered to be obsolete.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
24 relations
Algorithm
Brute-force attack
Ccrypt
Cisco IOS
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Storia di Crypt
Rbcafe
2014
Corpus ID: 63621336
2012
2012
Constant memory optimizations in MD5 Crypt cracking algorithm on GPU-accelerated supercomputer using CUDA
Feng Wang
,
Canqun Yang
,
Qiang Wu
,
Zhi-cai Shi
International Conference on Crowd Science and…
2012
Corpus ID: 16638684
MD5 Crypt is a cryptographic algorithm used commonly in UNIX system for authentication. By using the additional randomization of…
Expand
2009
2009
The Thirteenth-Century Fresco Decoration of Santa Maria Ad Cryptas in Fossa, Italy
A. W. Walker
2009
Corpus ID: 191079872
This paper discusses the fresco decoration of Santa Maria ad Cryptas. The frescoes are described and analyzed, and then compared…
Expand
2008
2008
In vivo endomicroscopy using three-dimensional optical coherence tomography and Fourier domain mode locked lasers
D. Adler
,
Yu Chen
,
R. Huber
,
J. Schmitt
,
J. Connolly
,
J. Fujimoto
SPIE BiOS
2008
Corpus ID: 122611316
We report an endoscopic optical coherence tomography (OCT) system based on a Fourier Domain Mode Locked (FDML) laser, a novel…
Expand
2005
2005
Mayan crypt reveals power of women
A. Witze
2005
Corpus ID: 190543679
Review
2004
Review
2004
The contribution of GPR to investigate damages in the crypt of the cathedral of otranto (Apulia, Italy)
L. Nuzzo
Proceedings of the Tenth International Conference…
2004
Corpus ID: 32508039
The presince of particular microclimatic conditions insidae monumental buildings, responsible of bio-deterioration processes, can…
Expand
2003
2003
DISTRIBUTED VIRTUAL ENVIRONMENTS FOR VISUALIZATION AND VISUAL DATA MINING
E. Paquet
,
H. Viktor
,
Wg Vi
2003
Corpus ID: 18657628
This paper presents a mobile virtual environment designed for the visualization of high-resolution virtualised scenes and for…
Expand
2000
2000
Ada Augusta, Countess of Lovelace, 1815-1852 - What was her family name?
J.A.N. Lee
IEEE Annals of the History of Computing
2000
Corpus ID: 45889178
What was her family name? In my book Computer Pioneers1 I listed our premier conceptual programmer under the heading “Ada Augusta…
Expand
2000
2000
Tele)tales from the Crypt
Nancy Barton
2000
Corpus ID: 194886259
1992
1992
Plasticity of the endoplasmic reticulum in three cell types of slugs poisoned by molluscicides
Rita Triebkorn
,
H. Köhler
Protoplasma
1992
Corpus ID: 37807726
SummaryIn three cell types of slug tissue-the crypt, mucous and storage cell-ultrastructural alterations of the endoplasmic…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE