Key derivation function

Results: 69



#Item
31Cryptographic software / Password / Rainbow table / Crypt / Salt / Key derivation function / Bcrypt / Password cracking / Security Accounts Manager / Cryptography / Computer security / Security

Enterprise Recipes with Ruby and Rails

Add to Reading List

Source URL: media.pragprog.com

Language: English - Date: 2009-06-01 18:00:49
32Password / Crypt / Cryptographic hash functions / Bcrypt / Salt / Shadow password / Key derivation function / Passwd / Dictionary attack / Cryptography / Cryptographic software / Key management

Issues for Consideration in the Review of Australian Higher Education April 2008 Vision As a peak body of established private providers of longstanding in the higher education sector our vision for higher education in Au

Add to Reading List

Source URL: cophe.edu.au

Language: English - Date: 2013-08-13 02:16:09
33Password / Crypt / Cryptographic hash functions / Bcrypt / Salt / Shadow password / Key derivation function / Passwd / Dictionary attack / Cryptography / Cryptographic software / Key management

THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 1999-06-14 15:28:14
34Key management / Crypt / Hashing / Bcrypt / Salt / Password / Hash function / Key derivation function / MD5 / Cryptography / Search algorithms / Cryptographic software

CRYPT(3) Library functions CRYPT(3)

Add to Reading List

Source URL: download.openwall.net

Language: English - Date: 2009-09-07 19:42:15
35Cryptographic hash functions / Mathematics / Information retrieval / Error detection and correction / Hash function / Hash table / Key derivation function / Tabulation hashing / Rainbow table / Search algorithms / Cryptography / Hashing

STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2013-12-11 18:35:17
36One-time password / Password / Keystroke logging / Two-factor authentication / Salt / Transaction authentication number / Malware / Key derivation function / Password cracking / Security / Computer security / Cryptography

How does two-factor authentication protect my users? Passwords are not strong enough for secure authentication on the web anymore. Even with complicated requirements and heavy hashing, passwords remain vulnerable to comm

Add to Reading List

Source URL: getclef.com

Language: English - Date: 2015-04-10 13:24:37
37Identity management / Key management / Password / Salt / Key derivation function / Memory / Key stretching / OTPW / Password strength / Cryptography / Security / Computer security

Towards reliable storage of 56-bit secrets in human memory Joseph Bonneau Princeton University Abstract Challenging the conventional wisdom that users cannot

Add to Reading List

Source URL: www.jbonneau.com

Language: English - Date: 2014-07-23 21:22:27
38Computer crimes / Password / Passphrase / Keystroke logging / Crypt / Brute-force attack / Key derivation function / Transaction authentication number / Phishing / Cryptography / Security / Computer security

Proc. HotSec ’07 Do Strong Web Passwords Accomplish Anything? Dinei Florencio,

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2008-11-29 12:03:58
39Search algorithms / Hashing / Password cracking / PBKDF2 / Salt / Password / Hash function / Crypt / Key derivation function / Cryptography / Cryptographic hash functions / Key management

Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs Marcos A. Simplicio Jr., Leonardo C. Almeida, Ewerton R. Andrade, Paulo C. F. dos Santos, and Paulo S. L. M. Barreto Escola Polit´ecni

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-27 11:02:00
40Password / John the Ripper / Passphrase / Dictionary attack / Key derivation function / Crypt / Crack / Part-of-speech tagging / Password manager / Cryptography / Computer security / Security

C:/Users/User/Dropbox/ResearchOld/passsphrase/CodaspyCameraReady/codasp040s-rao.dvi

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2012-12-19 23:22:32
UPDATE