Key derivation function

Results: 69



#Item
51An Administrator’s Guide to Internet Password Research∗ Dinei Florˆencio and Cormac Herley Microsoft Research, Redmond, USA Paul C. van Oorschot Carleton University, Ottawa, Canada

An Administrator’s Guide to Internet Password Research∗ Dinei Florˆencio and Cormac Herley Microsoft Research, Redmond, USA Paul C. van Oorschot Carleton University, Ottawa, Canada

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2014-08-31 16:13:05
52The Key Agreement Schemes Validation System (KASVS) Updated: May 22, 2014 Previously Updated: January 23, 2013 Previously Updated: September 1, 2011

The Key Agreement Schemes Validation System (KASVS) Updated: May 22, 2014 Previously Updated: January 23, 2013 Previously Updated: September 1, 2011

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-22 10:26:32
53The Key Agreement Schemes

The Key Agreement Schemes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-23 12:28:29
54NIST SP[removed]Recommendation for Key Derivation Using Pseudorandom Functions (Revised)

NIST SP[removed]Recommendation for Key Derivation Using Pseudorandom Functions (Revised)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 13:56:02
55Android Encryption Systems Peter Teufl, Andreas Fitzek, Daniel Hein, Alexander Marsalek, Alexander Oprisnik, Thomas Zefferer Institute for Applied Information Processing and Communications Graz University of Technology I

Android Encryption Systems Peter Teufl, Andreas Fitzek, Daniel Hein, Alexander Marsalek, Alexander Oprisnik, Thomas Zefferer Institute for Applied Information Processing and Communications Graz University of Technology I

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2014-05-05 09:27:53
56CRYPT(3)  Library functions CRYPT(3)

CRYPT(3) Library functions CRYPT(3)

Add to Reading List

Source URL: openwall.com

Language: English - Date: 2009-09-07 19:42:15
57NIST SP 800-56C Second Draft, Recommendation for Key Derivation through Extraction-then-Expansion

NIST SP 800-56C Second Draft, Recommendation for Key Derivation through Extraction-then-Expansion

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 13:48:23
58“Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd. {a.belenko, d.sklyarov} @ elcomsoft . com http://www.elcomsoft.com

“Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd. {a.belenko, d.sklyarov} @ elcomsoft . com http://www.elcomsoft.com

Add to Reading List

Source URL: www.elcomsoft.com

Language: English - Date: 2014-01-15 02:15:56
59NIST SP[removed]Revision 1, Recommendation for Existing Application-Specific Key Derivation Functions

NIST SP[removed]Revision 1, Recommendation for Existing Application-Specific Key Derivation Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:44:46
60Symmetric Key Management: Key Derivation and Key Wrap ¨

Symmetric Key Management: Key Derivation and Key Wrap ¨

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-03-28 05:53:29