Hashing

Results: 1317



#Item
171Lyra2 / Applied mathematics / Mathematics / Academia

The Lyra2 reference guide Marcos A. Simplicio Jr () Leonardo C. Almeida

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-02-02 12:02:02
172Cryptography / Cryptographic hash functions / NIST hash function competition / SHA-3 / Sponge function / Password / Crypt / Hash function / Exclusive or / Key derivation function / Lyra2

Gambit A sponge based, memory hard key derivation function Krisztián Pintér ()  Pseudocode S

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-14 07:18:05
173Cryptography / Cryptographic hash functions / Key management / Pseudorandomness / Search algorithms / PBKDF2 / Password / Scrypt / Crypt / Key derivation function / Pseudorandom function family / Salt

Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

Add to Reading List

Source URL: password-hashing.net

Language: English
174Cryptography / Secure communication / Cryptographic hash functions / Cryptographic protocols / Hashing / Transport Layer Security / Collision attack / Cipher suite / MD5 / OpenSSL / SHA-2 / Man-in-the-middle attack

Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Add to Reading List

Source URL: mitls.org

Language: English - Date: 2016-01-06 07:34:05
175Cryptography / Salt / Password / Cryptographic hash function / Crypt / Hash function / Random password generator / PBKDF2 / Key derivation function / Key / Bcrypt / Scrypt

The M AKWA Password Hashing Function Specifications v1.1 Thomas Pornin, <> April 22, 2015 Abstract

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-04-27 09:52:37
176

Algorithmic Improvements for Fast Concurrent Cuckoo Hashing Xiaozhou Li1 , David G. Andersen2 , Michael Kaminsky3 , Michael J. Freedman1 1 Princeton University, 2 Carnegie Mellon University, 3 Intel Labs

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2014-10-15 17:34:52
    177Concurrency control / Information science / Computing / Information retrieval / Transaction processing / Hashing / Search algorithms / Error detection and correction / Software transactional memory / Lock / Hash table / Linearizability

    adaptSTM - An Online Fine-grained Adaptive STM System Mathias Payer Thomas R. Gross ETH Zurich, Switzerland

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    178Cryptography / Key management / Cryptographic software / Bcrypt / Scrypt / Crypt / Key stretching / Password cracking / Key derivation function / Blowfish / Block cipher / Password

    battcrypt (Blowfish All The Things) Steven Thomas (steve at tobtu dot com) Specification Symbols/functions **

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2014-04-03 12:34:12
    179Cryptography / Key management / Cryptographic hash functions / Feistel cipher / Key stretching / Block cipher / Crypt / Scrypt / Password / Key derivation function / Data Encryption Standard / Key

    Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographic

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2014-04-03 12:37:38
    180Cryptography / Cryptographic hash functions / Search algorithms / Key management / Hashing / Scrypt / Salt / Password / Hash function / Crypt / Key derivation function / SHA-2

    TwoCats (and SkinnyCat): A Compute Time and Sequential Memory Hard Password Hashing Scheme Bill Cox

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2014-04-03 12:39:48
    UPDATE