<--- Back to Details
First PageDocument Content
Information retrieval / Artificial intelligence / Cryptographic hash functions / Error detection and correction / Hash function / Hash table / Key derivation function / Tabulation hashing / Rainbow table / Search algorithms / Cryptography / Hashing
Date: 2011-10-27 15:49:52
Information retrieval
Artificial intelligence
Cryptographic hash functions
Error detection and correction
Hash function
Hash table
Key derivation function
Tabulation hashing
Rainbow table
Search algorithms
Cryptography
Hashing

scrypt.dvi

Add to Reading List

Source URL: www.tarsnap.com

Download Document from Source Website

File Size: 201,84 KB

Share Document on Facebook

Similar Documents

Cryptography / Password / Salt / Key derivation function / Key stretching / Crypt / PBKDF2 / Rainbow table / Scrypt / Bcrypt / Passphrase / Password manager

Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de

DocID: 1rfah - View Document

Cryptography / Computing / Scrypt / Key management / PBKDF2 / Key derivation function / CPU cache / Password / Cache / Timing attack / Lookup table

Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au

DocID: 1r3RN - View Document

Computer access control / Cryptography / Computer security / Password / Security / Cybercrime / Identity management / Salt / Phishing / Crypt / Key derivation function / Pass

Passpet: Convenient Password Management and Phishing Protection Ka-Ping Yee University of California, Berkeley

DocID: 1r2oC - View Document

Computer access control / Cryptography / Computer security / Identity management / Password / Security / One-time password / Challengeresponse authentication / Crypt / Key derivation function / Password strength / Password fatigue

Mercury: Recovering Forgotten Passwords Using Personal Devices⋆ Mohammad Mannan1 , David Barrera2, Carson Brown2, David Lie1 , and Paul C. van Oorschot2 1

DocID: 1qoqY - View Document

Cryptography / Password / Java applet / Dropbox / Applet / Crypt / Expect / Key derivation function / Password manager / Password policy

Improving the Password Selection Mechanism Richard M. Conlan Peter Tarasewich Northeastern University CC&IS

DocID: 1ppQz - View Document