<--- Back to Details
First PageDocument Content
Disk encryption theory / Dm-crypt / Linux Unified Key Setup / TrueCrypt / Block cipher modes of operation / PBKDF2 / Crypt / Advanced Encryption Standard / Initialization vector / Cryptography / Disk encryption / Cryptographic software
Disk encryption theory
Dm-crypt
Linux Unified Key Setup
TrueCrypt
Block cipher modes of operation
PBKDF2
Crypt
Advanced Encryption Standard
Initialization vector
Cryptography
Disk encryption
Cryptographic software

Add to Reading List

Source URL: clemens.endorphin.org

Download Document from Source Website

File Size: 1,03 MB

Share Document on Facebook

Similar Documents

Cryptography / Password / Salt / Key derivation function / Key stretching / Crypt / PBKDF2 / Rainbow table / Scrypt / Bcrypt / Passphrase / Password manager

Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de

DocID: 1rfah - View Document

Cryptography / Computing / Scrypt / Key management / PBKDF2 / Key derivation function / CPU cache / Password / Cache / Timing attack / Lookup table

Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au

DocID: 1r3RN - View Document

Scrypt / Key management / Cryptography / PBKDF2 / Key derivation function / Password / Cache / Crypt

Cache Attack Against scrypt Advisor(s): Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

DocID: 1p7g0 - View Document

Cryptography / CubeHash / Cryptographic hash function / Crypt / Hash function / Stream cipher / PBKDF2 / Scrypt / Salt / Password / Bcrypt / Key derivation function

Ω Omega Crypt (ocrypt) Brandon Enright http://www.brandonenright.net/ocrypt/

DocID: 1o00I - View Document

Cryptography / Cryptographic hash functions / Hashing / Cryptographic software / Key management / Crypt / Scrypt / SHA-2 / Password / Hash function / PBKDF2 / Salt

Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

DocID: 1nNon - View Document