Key derivation function

Results: 69



#Item
21

NeoScrypt, a Strong Memory Intensive Key Derivation Function

Add to Reading List

Source URL: www.ftc-c.com

Language: English - Date: 2014-07-28 11:00:04
    22Password / Key management / Crypt / John the Ripper / Key derivation function / Brute-force attack / Passwd / Botnet / OTPW / Cryptography / Computer security / Security

    Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mc

    Add to Reading List

    Source URL: nsrc.cse.psu.edu

    Language: English - Date: 2015-04-16 15:07:31
    23Cryptographic protocols / Elliptic curve Diffie–Hellman / Diffie–Hellman key exchange / SHA-1 / SHA-2 / Elliptic Curve DSA / Key derivation function / Key / CRYPTREC / Cryptography / Cryptographic hash functions / Key management

    Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Key Establishment Schemes —

    Add to Reading List

    Source URL: www.ipa.go.jp

    Language: English - Date: 2013-05-28 08:17:39
    24Password / Salt / Passwd / John the Ripper / Key derivation function / Crypt / Password strength / OTPW / Cryptography / Computer security / Security

    CERIAS Tech ReportErsatzPasswords Ending Password Cracking by Mohammed H. Almeshekah, Christopher N. Gutierrez, Mikhail J. Atallah and Eugene H. Spafford Center for Education and Research Information Assurance an

    Add to Reading List

    Source URL: www.cerias.purdue.edu

    Language: English - Date: 2015-02-13 11:29:28
    25Computer security / Mozilla add-ons / Key management / Password / LastPass Password Manager / PBKDF2 / Keychain / Key derivation function / Crypt / Cryptography / Software / Cryptographic software

    PDF Document

    Add to Reading List

    Source URL: media.blackhat.com

    Language: English - Date: 2012-04-07 15:32:02
    26Internet protocols / Internet standards / Cryptographic protocols / Key derivation function / PBKDF2 / Online Certificate Status Protocol / Digital signature / Password / Steganography / Cryptography / Key management / Public-key cryptography

    Security  Highlights   The  IBM  Mobile  Iden7ty  framework  has  embraced  several  industry  standards  to  allow  applica7on   developers  to  create  secure  s

    Add to Reading List

    Source URL: www-01.ibm.com

    Language: English - Date: 2014-11-20 11:27:30
    27Key derivation function / Passwd / PBKDF2 / Crypt / Key / Shadow password / Key stretching / Cryptography / Key management / Password

    scrypt: A key derivation function - Doing our best to thwart TLAs armed with ASICs

    Add to Reading List

    Source URL: passwords12.at.ifi.uio.no

    Language: English - Date: 2012-12-04 07:18:10
    28Key management / Password / Cryptographic software / Salt / Phishing / Key stretching / SiteKey / Crypt / Key derivation function / Cryptography / Security / Computer security

    Passpet: Convenient Password Management and Phishing Protection Ka-Ping Yee University of California, Berkeley

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2006-05-30 18:17:59
    29Cryptography / Applied mathematics / Crypt / Field-programmable gate array / Key derivation function / Password / Salt / MD5 / SHA-2 / Cryptographic hash functions / Mathematics / Key management

    PRINCE modern password guessing algorithm Why do we need a new attack-mode? FUTURE OF PASSWORD HASHES

    Add to Reading List

    Source URL: hashcat.net

    Language: English - Date: 2014-12-08 07:12:08
    30Password / Key management / John the Ripper / Crypt / Key derivation function / Brute-force attack / OTPW / Shadow password / Cryptography / Security / Computer security

    Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Trent Jaeger Systems and Internet Infrastructure Securit

    Add to Reading List

    Source URL: www.enck.org

    Language: English
    UPDATE