Key derivation function

Results: 69



#Item
61NIST SP 800-56C, Recommendation for Key Derivation through Extraction-then-Expansion

NIST SP 800-56C, Recommendation for Key Derivation through Extraction-then-Expansion

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-06 15:01:52
62Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff Arvind Narayanan and Vitaly Shmatikov

Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff Arvind Narayanan and Vitaly Shmatikov

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2005-09-13 00:37:50
63Practical Electromagnetic Template Attack on HMAC Pierre-Alain Fouque1 , Gaëtan Leurent1 , Denis Réal2,3 , and Frédéric Valette3

Practical Electromagnetic Template Attack on HMAC Pierre-Alain Fouque1 , Gaëtan Leurent1 , Denis Réal2,3 , and Frédéric Valette3

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2009-12-17 12:00:22
64scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2011-10-27 15:49:52
65

PDF Document

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-09-26 01:52:54
66scrypt.dvi

scrypt.dvi

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2011-10-27 15:49:52
67

PDF Document

Add to Reading List

Source URL: lasecwww.epfl.ch

Language: English - Date: 2009-11-18 09:27:21
68

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:41:01
69

PDF Document

Add to Reading List

Source URL: clemens.endorphin.org

Language: English