Key derivation function

Results: 69



#Item
21NeoScrypt, a Strong Memory Intensive Key Derivation Function

NeoScrypt, a Strong Memory Intensive Key Derivation Function

Add to Reading List

Source URL: www.ftc-c.com

Language: English - Date: 2014-07-28 11:00:04
    22Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mc

    Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mc

    Add to Reading List

    Source URL: nsrc.cse.psu.edu

    Language: English - Date: 2015-04-16 15:07:31
    23Japan Cryptographic Module Validation Program(JCMVP)  Specifications of Cryptographic Algorithm Implementation Testing — Key Establishment Schemes —

    Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Key Establishment Schemes —

    Add to Reading List

    Source URL: www.ipa.go.jp

    Language: English - Date: 2013-05-28 08:17:39
    24CERIAS Tech ReportErsatzPasswords Ending Password Cracking by Mohammed H. Almeshekah, Christopher N. Gutierrez, Mikhail J. Atallah and Eugene H. Spafford Center for Education and Research Information Assurance an

    CERIAS Tech ReportErsatzPasswords Ending Password Cracking by Mohammed H. Almeshekah, Christopher N. Gutierrez, Mikhail J. Atallah and Eugene H. Spafford Center for Education and Research Information Assurance an

    Add to Reading List

    Source URL: www.cerias.purdue.edu

    Language: English - Date: 2015-02-13 11:29:28
    25

    PDF Document

    Add to Reading List

    Source URL: media.blackhat.com

    Language: English - Date: 2012-04-07 15:32:02
    26Security	
  Highlights	
   The	
  IBM	
  Mobile	
  Iden7ty	
  framework	
  has	
  embraced	
  several	
  industry	
  standards	
  to	
  allow	
  applica7on	
   developers	
  to	
  create	
  secure	
  s

    Security  Highlights   The  IBM  Mobile  Iden7ty  framework  has  embraced  several  industry  standards  to  allow  applica7on   developers  to  create  secure  s

    Add to Reading List

    Source URL: www-01.ibm.com

    Language: English - Date: 2014-11-20 11:27:30
    27scrypt: A key derivation function - Doing our best to thwart TLAs armed with ASICs

    scrypt: A key derivation function - Doing our best to thwart TLAs armed with ASICs

    Add to Reading List

    Source URL: passwords12.at.ifi.uio.no

    Language: English - Date: 2012-12-04 07:18:10
    28Passpet: Convenient Password Management and Phishing Protection Ka-Ping Yee University of California, Berkeley

    Passpet: Convenient Password Management and Phishing Protection Ka-Ping Yee University of California, Berkeley

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2006-05-30 18:17:59
    29PRINCE modern password guessing algorithm Why do we need a new attack-mode?  FUTURE OF PASSWORD HASHES

    PRINCE modern password guessing algorithm Why do we need a new attack-mode? FUTURE OF PASSWORD HASHES

    Add to Reading List

    Source URL: hashcat.net

    Language: English - Date: 2014-12-08 07:12:08
    30Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Trent Jaeger Systems and Internet Infrastructure Securit

    Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Trent Jaeger Systems and Internet Infrastructure Securit

    Add to Reading List

    Source URL: www.enck.org

    Language: English