<--- Back to Details
First PageDocument Content
Encrypting File System / Filesystem-level encryption / Loop device / PBKDF2 / GEOM / BestCrypt / NetBSD / NTFS / Symmetric-key algorithm / Cryptography / Disk encryption / Cryptographic software
Date: 2004-02-26 15:40:30
Encrypting File System
Filesystem-level encryption
Loop device
PBKDF2
GEOM
BestCrypt
NetBSD
NTFS
Symmetric-key algorithm
Cryptography
Disk encryption
Cryptographic software

Add to Reading List

Source URL: www.imrryr.org

Download Document from Source Website

File Size: 98,35 KB

Share Document on Facebook

Similar Documents

Cryptography / Password / Salt / Key derivation function / Key stretching / Crypt / PBKDF2 / Rainbow table / Scrypt / Bcrypt / Passphrase / Password manager

Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de

DocID: 1rfah - View Document

Cryptography / Computing / Scrypt / Key management / PBKDF2 / Key derivation function / CPU cache / Password / Cache / Timing attack / Lookup table

Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au

DocID: 1r3RN - View Document

Scrypt / Key management / Cryptography / PBKDF2 / Key derivation function / Password / Cache / Crypt

Cache Attack Against scrypt Advisor(s): Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

DocID: 1p7g0 - View Document

Cryptography / CubeHash / Cryptographic hash function / Crypt / Hash function / Stream cipher / PBKDF2 / Scrypt / Salt / Password / Bcrypt / Key derivation function

Ω Omega Crypt (ocrypt) Brandon Enright http://www.brandonenright.net/ocrypt/

DocID: 1o00I - View Document

Cryptography / Cryptographic hash functions / Hashing / Cryptographic software / Key management / Crypt / Scrypt / SHA-2 / Password / Hash function / PBKDF2 / Salt

Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

DocID: 1nNon - View Document