Key derivation function

Results: 69



#Item
41Password / Passphrase / Dictionary attack / Crypt / Crack / Key derivation function / Password policy / Password manager / Cryptography / Computer security / Security

Joint Universities Computer Centre Limited (“JUCC”) Information Security Awareness Training - Session Two End User Security, IS Control Evaluation & Self- Assessment Password Management

Add to Reading List

Source URL: www.istf.jucc.edu.hk

Language: English - Date: 2011-11-23 20:45:53
42Password / PBKDF2 / Brute-force attack / Bcrypt / Crypt / Key stretching / Rainbow table / Cryptography / Key management / Key derivation function

scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2015-01-21 18:21:31
43Cryptographic hash functions / Mathematics / Information retrieval / Error detection and correction / Hash function / Hash table / Key derivation function / Tabulation hashing / Rainbow table / Search algorithms / Cryptography / Hashing

STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2015-01-21 18:21:31
44Dirac delta function / Fourier analysis / Exponentially equivalent measures / Mathematical analysis / Measure theory / Digital signal processing

Randomness in Cryptography March 25, 2013 Lecture 11: Key Derivation without entropy loss Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:30
45Disk encryption / Security and safety features new to Windows Vista / Cryptography / Key derivation function / Key management

Microsoft Word - PP_Encrypted_storage_device_MSB_2012[removed]docx

Add to Reading List

Source URL: fmv.se

Language: English - Date: 2012-08-14 06:41:14
46Randomness / Key management / Pseudorandomness / Randomness extractor / Key derivation function / Extractor / Random number generation / Cryptographic hash function / Key / Cryptography / Applied mathematics / Theoretical computer science

Cryptographic Extraction and Key Derivation: The HKDF Scheme Hugo Krawczyk∗ Abstract In spite of the central role of key derivation functions (KDF) in applied cryptography, there

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-10 19:09:23
47Disk encryption / Security and safety features new to Windows Vista / Cryptography / Key derivation function / Key management

Microsoft Word - PP_Encrypted_storage_device_MSB_2012[removed]docx

Add to Reading List

Source URL: www.fmv.se

Language: English - Date: 2012-08-14 06:41:14
48Function / Μ operator / Mathematics / Functions and mappings / Symbol

Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security ? Baodong Qin1,2 , Shengli Liu1,?? , Tsz Hon Yuen3 , Robert H. Deng4 , and Kefei Chen5 1. Department of Computer Science and Engineering

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-10 03:19:20
49Identity management / Key management / Password / Salt / Key derivation function / Memory / Key stretching / OTPW / Password strength / Cryptography / Security / Computer security

Towards reliable storage of 56-bit secrets in human memory Joseph Bonneau Princeton University Abstract Challenging the conventional wisdom that users cannot

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2014-07-11 02:16:29
50Password / John the Ripper / Passphrase / Dictionary attack / Key derivation function / Crypt / Crack / Part-of-speech tagging / Password manager / Cryptography / Computer security / Security

C:/Users/User/Dropbox/ResearchOld/passsphrase/CodaspyCameraReady/codasp040s-rao.dvi

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2012-12-19 23:22:32
UPDATE