Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,237,305 papers from all fields of science
Search
Sign In
Create Free Account
Crypt (Unix)
Known as:
Crypt (disambiguation)
In Unix computing, crypt is a utility program used for encryption. Due to the ease of breaking it, it is considered to be obsolete.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
24 relations
Algorithm
Brute-force attack
Ccrypt
Cisco IOS
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Crypt 3 in the Northwest Annex of the Monastery on Kom H in Dongola:report on the exploration in 2012
R. Mahler
,
W. Godlewski
,
Katarzyna Danys-Lasek
,
B. Czaja
2016
Corpus ID: 56160635
Archaeological exploration of Crypt 3 in the commemorative burial complex in the Northwest Annex of the Monastery on Kom H in…
Expand
Highly Cited
2015
Highly Cited
2015
Iris recognition based on human-interpretable features
Jianxu Chen
,
Feng Shen
,
D. Chen
,
P. Flynn
International Conference on Identity, Security…
2015
Corpus ID: 15659528
The iris is a stable biometric that has been widely used for human recognition in various applications. However, official…
Expand
Review
2013
Review
2013
Microgravity and Ground‐penetrating Radar Investigations of Subsurface Features at the St Catherine's Monastery, Slovakia
J. Pánisová
,
M. Fraštia
,
T. Wunderlich
,
R. Pašteka
,
D. Kušnirák
2013
Corpus ID: 62824698
The ruins of the St Catherine's monastery complex, the largest sacral ruins in Slovakia, are an important example of Slovak…
Expand
Review
2007
Review
2007
Tales from the Crypt
P. Coclanis
2007
Corpus ID: 14612821
s time passes, it has become more and more clear that George Orwell got a lot of things right over the course of his short life…
Expand
2007
2007
Specifying Kerberos over EAP: Towards an integrated network access and Kerberos single sign-on process
Saber Zrelli
,
Y. Shinoda
International Conference on Advanced Information…
2007
Corpus ID: 463983
Kerberos is a widely deployed authentication system used for authenticating users to various types of application services in…
Expand
2005
2005
Cracking Unix Passwords using FPGA Platforms
N. Mentens
,
L. Batina
,
B. Preneel
,
I. Verbauwhede
2005
Corpus ID: 59809235
SHARCS - Special Purpose Hardware for Attacking Cryptographic Systems, February 24-25, Paris, 2005 : ECRYPT Workshop
2003
2003
Candidate markers for stem and early progenitor cells, Musashi-1 and Hes1, are expressed in crypt base columnar cells of mouse small intestine
萱原 隆久
2003
Corpus ID: 87019830
Highly Cited
1998
Highly Cited
1998
Tales from the crypt: On the role of death in life
S. Solomon
,
J. Greenberg
,
T. Pyszczynski
1998
Corpus ID: 53561221
An existential psychodynamic theory is presented based on Ernest Becker's claim that self-esteem and cultural worldviews function…
Expand
Highly Cited
1992
Highly Cited
1992
Fast Exponentiation with Precomputation (Extended Abstract)
E. F. Brickell
,
D. M. Gordon
,
K. McCurley
,
D. Wilson
International Conference on the Theory and…
1992
Corpus ID: 26786241
In several cryptographic systems, a fixed element g of a group (generally Z/qZ) is repeatedly raised to many different powers. In…
Expand
1978
1978
Distribution of Glucocorticoid Receptors in Rat Intestinal Epithelium
M. Lentze
,
P. C. Moxey
,
J. S. Trier
Pediatric Research
1978
Corpus ID: 35632305
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE