Function key

Results: 1153



#Item
81Cryptography / Argon2 / Lyra2 / BLAKE / Password Hashing Competition / Key derivation function / Hash function / Cryptographic hash function / Cryptographic nonce / Password / Salt / Scrypt

Argon2 Designers: Alex Biryukov, Daniel Dinu, and Dmitry Khovratovich University of Luxembourg, Luxembourg , , https://www.cryptolux.org/index.php/Argo

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-07-22 02:06:59
82Cryptography / CubeHash / Cryptographic hash function / Crypt / Hash function / Stream cipher / PBKDF2 / Scrypt / Salt / Password / Bcrypt / Key derivation function

Ω Omega Crypt (ocrypt) Brandon Enright http://www.brandonenright.net/ocrypt/

Add to Reading List

Source URL: password-hashing.net

Language: English
83Neuroscience / Nervous system / Biology / Sleep / Neurophysiology / Thalamus / Rapid eye movement sleep / Gene expression profiling / Circadian rhythm / Cycle / Gene / Hypothalamus

Physiol Genomics 31: 441–457, 2007. First published August 14, 2007; doi:physiolgenomicsMacromolecule biosynthesis: a key function of sleep Miroslaw Mackiewicz,1,2 Keith R. Shockley,3 Micah A. Rome

Add to Reading List

Source URL: www-stat.wharton.upenn.edu

Language: English - Date: 2008-03-06 22:48:55
84Cryptography / Cryptographic hash functions / Hashing / Cryptographic software / Key management / Crypt / Scrypt / SHA-2 / Password / Hash function / PBKDF2 / Salt

Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-10-16 08:19:35
85Cryptography / Cryptographic hash functions / NIST hash function competition / SHA-3 / Sponge function / Password / Crypt / Hash function / Exclusive or / Key derivation function / Lyra2

Gambit A sponge based, memory hard key derivation function Krisztián Pintér ()  Pseudocode S

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-14 07:18:05
86Cryptography / Cryptographic hash functions / Key management / Pseudorandomness / Search algorithms / PBKDF2 / Password / Scrypt / Crypt / Key derivation function / Pseudorandom function family / Salt

Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

Add to Reading List

Source URL: password-hashing.net

Language: English
87Cryptography / Salt / Password / Cryptographic hash function / Crypt / Hash function / Random password generator / PBKDF2 / Key derivation function / Key / Bcrypt / Scrypt

The M AKWA Password Hashing Function Specifications v1.1 Thomas Pornin, <> April 22, 2015 Abstract

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-04-27 09:52:37
88Cryptography / Public-key cryptography / Commitment scheme / Cryptographic hash function / CramerShoup cryptosystem / RSA / Crypt / Digital signature

This is the Full Version of the Extended Abstract that appears in the Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’February – 1 March 2013, Nara, Ja

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-02-21 09:51:42
89Cryptography / Key management / Cryptographic software / Bcrypt / Scrypt / Crypt / Key stretching / Password cracking / Key derivation function / Blowfish / Block cipher / Password

battcrypt (Blowfish All The Things) Steven Thomas (steve at tobtu dot com) Specification Symbols/functions **

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-03 12:34:12
90Cryptography / Key management / Cryptographic hash functions / Feistel cipher / Key stretching / Block cipher / Crypt / Scrypt / Password / Key derivation function / Data Encryption Standard / Key

Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographic

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-03 12:37:38
UPDATE