Home | History | Annotate | Download | only in libtomcrypt

Lines Matching refs:people

201 I would like to give thanks to the following people (in no particular order) for helping me develop this project from
219 There have been quite a few other people as well. Please check the change log to see who else has contributed from
776 This mode is very weak since it allows people to swap blocks and perform replay attacks if the same key is used more
4772 people trying to brute force guess the password. The higher the iteration counter the longer the delay. This algorithm also requires a hash