Key derivation function

Results: 69



#Item
31Enterprise Recipes with Ruby and Rails

Enterprise Recipes with Ruby and Rails

Add to Reading List

Source URL: media.pragprog.com

Language: English - Date: 2009-06-01 18:00:49
32Issues for Consideration in the Review of Australian Higher Education April 2008 Vision As a peak body of established private providers of longstanding in the higher education sector our vision for higher education in Au

Issues for Consideration in the Review of Australian Higher Education April 2008 Vision As a peak body of established private providers of longstanding in the higher education sector our vision for higher education in Au

Add to Reading List

Source URL: cophe.edu.au

Language: English - Date: 2013-08-13 02:16:09
33THE ADVANCED COMPUTING SYSTEMS ASSOCIATION  The following paper was originally published in the Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference

THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 1999-06-14 15:28:14
34CRYPT(3)  Library functions CRYPT(3)

CRYPT(3) Library functions CRYPT(3)

Add to Reading List

Source URL: download.openwall.net

Language: English - Date: 2009-09-07 19:42:15
35STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2013-12-11 18:35:17
36How does two-factor authentication protect my users? Passwords are not strong enough for secure authentication on the web anymore. Even with complicated requirements and heavy hashing, passwords remain vulnerable to comm

How does two-factor authentication protect my users? Passwords are not strong enough for secure authentication on the web anymore. Even with complicated requirements and heavy hashing, passwords remain vulnerable to comm

Add to Reading List

Source URL: getclef.com

Language: English - Date: 2015-04-10 13:24:37
37Towards reliable storage of 56-bit secrets in human memory Joseph Bonneau Princeton University Abstract Challenging the conventional wisdom that users cannot

Towards reliable storage of 56-bit secrets in human memory Joseph Bonneau Princeton University Abstract Challenging the conventional wisdom that users cannot

Add to Reading List

Source URL: www.jbonneau.com

Language: English - Date: 2014-07-23 21:22:27
38Proc.  HotSec ’07 Do Strong Web Passwords Accomplish Anything? Dinei Florencio,

Proc. HotSec ’07 Do Strong Web Passwords Accomplish Anything? Dinei Florencio,

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2008-11-29 12:03:58
39Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs Marcos A. Simplicio Jr., Leonardo C. Almeida, Ewerton R. Andrade, Paulo C. F. dos Santos, and Paulo S. L. M. Barreto Escola Polit´ecni

Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs Marcos A. Simplicio Jr., Leonardo C. Almeida, Ewerton R. Andrade, Paulo C. F. dos Santos, and Paulo S. L. M. Barreto Escola Polit´ecni

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-27 11:02:00
40C:/Users/User/Dropbox/ResearchOld/passsphrase/CodaspyCameraReady/codasp040s-rao.dvi

C:/Users/User/Dropbox/ResearchOld/passsphrase/CodaspyCameraReady/codasp040s-rao.dvi

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2012-12-19 23:22:32