Key derivation function

Results: 69



#Item
61Key management / HMAC / Cryptographic hash function / Key / CMAC / SHA-2 / Symmetric-key algorithm / Cryptography / Message authentication codes / Hashing

NIST SP 800-56C, Recommendation for Key Derivation through Extraction-then-Expansion

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-06 15:01:52
62Rainbow table / Key management / Password / Dictionary attack / Salt / Key derivation function / Random password generator / Key space / John the Ripper / Cryptography / Espionage / Cryptographic hash functions

Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff Arvind Narayanan and Vitaly Shmatikov

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2005-09-13 00:37:50
63Hashing / Message authentication codes / Coding theory / HMAC / SHA-2 / MD5 / Key derivation function / Collision attack / SHA-1 / Cryptography / Error detection and correction / Cryptographic hash functions

Practical Electromagnetic Template Attack on HMAC Pierre-Alain Fouque1 , Gaëtan Leurent1 , Denis Réal2,3 , and Frédéric Valette3

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2009-12-17 12:00:22
64Password / PBKDF2 / Brute-force attack / Bcrypt / Crypt / Key stretching / Rainbow table / Cryptography / Key management / Key derivation function

scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2011-10-27 15:49:52
65Password / Salt / Cryptographic software / Crypt / Phishing / Security token / Key derivation function / Random password generator / Password manager / Cryptography / Security / Computer security

PDF Document

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-09-26 01:52:54
66Information retrieval / Artificial intelligence / Cryptographic hash functions / Error detection and correction / Hash function / Hash table / Key derivation function / Tabulation hashing / Rainbow table / Search algorithms / Cryptography / Hashing

scrypt.dvi

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2011-10-27 15:49:52
67Password / Salt / SQL injection / Cryptographic hash function / Cross-site scripting / MD5 / Crypt / Key derivation function / Cryptography / Cyberwarfare / Computer security

PDF Document

Add to Reading List

Source URL: lasecwww.epfl.ch

Language: English - Date: 2009-11-18 09:27:21
68Crypt / Password / PBKDF2 / Salt / Key / Passphrase / Key stretching / Password-based cryptography / Cryptography / Key management / Key derivation function

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:41:01
69Passphrase / Password / Salt / Crypt / Key / Key stretching / Key derivation function / Cryptography / Key management / PBKDF2

PDF Document

Add to Reading List

Source URL: clemens.endorphin.org

Language: English
UPDATE