Key derivation function

Results: 69



#Item
41Joint Universities Computer Centre Limited (“JUCC”) Information Security Awareness Training - Session Two End User Security, IS Control Evaluation & Self- Assessment  Password Management

Joint Universities Computer Centre Limited (“JUCC”) Information Security Awareness Training - Session Two End User Security, IS Control Evaluation & Self- Assessment Password Management

Add to Reading List

Source URL: www.istf.jucc.edu.hk

Language: English - Date: 2011-11-23 20:45:53
42scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2015-01-21 18:21:31
43STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2015-01-21 18:21:31
44Randomness in Cryptography  March 25, 2013 Lecture 11: Key Derivation without entropy loss Lecturer: Yevgeniy Dodis

Randomness in Cryptography March 25, 2013 Lecture 11: Key Derivation without entropy loss Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:30
45Microsoft Word - PP_Encrypted_storage_device_MSB_2012[removed]docx

Microsoft Word - PP_Encrypted_storage_device_MSB_2012[removed]docx

Add to Reading List

Source URL: fmv.se

Language: English - Date: 2012-08-14 06:41:14
46Cryptographic Extraction and Key Derivation: The HKDF Scheme Hugo Krawczyk∗ Abstract In spite of the central role of key derivation functions (KDF) in applied cryptography, there

Cryptographic Extraction and Key Derivation: The HKDF Scheme Hugo Krawczyk∗ Abstract In spite of the central role of key derivation functions (KDF) in applied cryptography, there

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-10 19:09:23
47Microsoft Word - PP_Encrypted_storage_device_MSB_2012[removed]docx

Microsoft Word - PP_Encrypted_storage_device_MSB_2012[removed]docx

Add to Reading List

Source URL: www.fmv.se

Language: English - Date: 2012-08-14 06:41:14
48Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security ? Baodong Qin1,2 , Shengli Liu1,?? , Tsz Hon Yuen3 , Robert H. Deng4 , and Kefei Chen5 1. Department of Computer Science and Engineering

Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security ? Baodong Qin1,2 , Shengli Liu1,?? , Tsz Hon Yuen3 , Robert H. Deng4 , and Kefei Chen5 1. Department of Computer Science and Engineering

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-10 03:19:20
49Towards reliable storage of 56-bit secrets in human memory Joseph Bonneau Princeton University Abstract Challenging the conventional wisdom that users cannot

Towards reliable storage of 56-bit secrets in human memory Joseph Bonneau Princeton University Abstract Challenging the conventional wisdom that users cannot

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2014-07-11 02:16:29
50C:/Users/User/Dropbox/ResearchOld/passsphrase/CodaspyCameraReady/codasp040s-rao.dvi

C:/Users/User/Dropbox/ResearchOld/passsphrase/CodaspyCameraReady/codasp040s-rao.dvi

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2012-12-19 23:22:32