Cryptographic hash functions

Results: 1068



#Item
51Gambit A sponge based, memory hard key derivation function Krisztián Pintér ()  Pseudocode S

Gambit A sponge based, memory hard key derivation function Krisztián Pintér ()  Pseudocode S

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-14 07:18:05
52Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

Add to Reading List

Source URL: www.estv.admin.ch

Language: English
53Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

Add to Reading List

Source URL: password-hashing.net

Language: English
54Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Add to Reading List

Source URL: mitls.org

Language: English - Date: 2016-01-06 07:34:05
55Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographic

Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographic

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-03 12:37:38
56TwoCats (and SkinnyCat): A Compute Time and Sequential Memory Hard Password Hashing Scheme Bill Cox

TwoCats (and SkinnyCat): A Compute Time and Sequential Memory Hard Password Hashing Scheme Bill Cox

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-03 12:39:48
57The Catena Password-Scrambling Framework Christian Forler∗ Stefan Lucks†

The Catena Password-Scrambling Framework Christian Forler∗ Stefan Lucks†

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-09-29 12:17:24
58Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

Add to Reading List

Source URL: www.estv.admin.ch

Language: English
59Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto  www.bitcoin.org  Abstract. A purely peer-to-peer version of electronic cash would allow online

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.weusecoins.com

Language: English - Date: 2016-06-04 00:10:37
60PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres

PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-12-09 05:42:43