Key derivation function

Results: 69



#Item
11The M AKWA Password Hashing Function Specifications v1.1 Thomas Pornin, <> April 22, 2015  Abstract

The M AKWA Password Hashing Function Specifications v1.1 Thomas Pornin, <> April 22, 2015 Abstract

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-04-27 09:52:37
12battcrypt (Blowfish All The Things) Steven Thomas (steve at tobtu dot com) Specification Symbols/functions **

battcrypt (Blowfish All The Things) Steven Thomas (steve at tobtu dot com) Specification Symbols/functions **

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-03 12:34:12
13Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographic

Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographic

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-03 12:37:38
14Security of Key Derivation Functions Ewerton Rodrigues Andrade  Advisor: Prof. Dr. Marcos Antonio Simplicio Junior ´

Security of Key Derivation Functions Ewerton Rodrigues Andrade Advisor: Prof. Dr. Marcos Antonio Simplicio Junior ´

Add to Reading List

Source URL: lyra2.net

Language: English - Date: 2014-01-07 11:26:38
15TwoCats (and SkinnyCat): A Compute Time and Sequential Memory Hard Password Hashing Scheme Bill Cox

TwoCats (and SkinnyCat): A Compute Time and Sequential Memory Hard Password Hashing Scheme Bill Cox

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-03 12:39:48
16POMELO A Password Hashing Algorithm (Version 2) Designer and Submitter: Hongjun Wu Division of Mathematical Sciences Nanyang Technological University

POMELO A Password Hashing Algorithm (Version 2) Designer and Submitter: Hongjun Wu Division of Mathematical Sciences Nanyang Technological University

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-04-14 02:03:17
17The Catena Password-Scrambling Framework Christian Forler∗ Stefan Lucks†

The Catena Password-Scrambling Framework Christian Forler∗ Stefan Lucks†

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-09-29 12:17:24
18STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

Add to Reading List

Source URL: www.daemonology.net

Language: English - Date: 2009-06-11 07:29:01
19scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2015-05-31 02:47:44
    20scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

    scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

    Add to Reading List

    Source URL: www.daemonology.net

    Language: English - Date: 2009-06-11 07:30:54