Key derivation function

Results: 69



#Item
1Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de

Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-17 04:25:27
2Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au

Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
3Passpet: Convenient Password Management and Phishing Protection Ka-Ping Yee University of California, Berkeley

Passpet: Convenient Password Management and Phishing Protection Ka-Ping Yee University of California, Berkeley

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-05-30 18:17:59
4Mercury: Recovering Forgotten Passwords Using Personal Devices⋆ Mohammad Mannan1 , David Barrera2, Carson Brown2, David Lie1 , and Paul C. van Oorschot2 1

Mercury: Recovering Forgotten Passwords Using Personal Devices⋆ Mohammad Mannan1 , David Barrera2, Carson Brown2, David Lie1 , and Paul C. van Oorschot2 1

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2010-12-21 12:01:07
5Improving the Password Selection Mechanism Richard M. Conlan Peter Tarasewich  Northeastern University CC&IS

Improving the Password Selection Mechanism Richard M. Conlan Peter Tarasewich Northeastern University CC&IS

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-02 14:44:50
6Cache Attack Against scrypt Advisor(s): Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Cache Attack Against scrypt Advisor(s): Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
7Argon2 Designers: Alex Biryukov, Daniel Dinu, and Dmitry Khovratovich University of Luxembourg, Luxembourg , ,  https://www.cryptolux.org/index.php/Argo

Argon2 Designers: Alex Biryukov, Daniel Dinu, and Dmitry Khovratovich University of Luxembourg, Luxembourg , , https://www.cryptolux.org/index.php/Argo

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-07-22 02:06:59
8Ω  Omega Crypt (ocrypt) Brandon Enright  http://www.brandonenright.net/ocrypt/

Ω Omega Crypt (ocrypt) Brandon Enright http://www.brandonenright.net/ocrypt/

Add to Reading List

Source URL: password-hashing.net

Language: English
9Gambit A sponge based, memory hard key derivation function Krisztián Pintér ()  Pseudocode S

Gambit A sponge based, memory hard key derivation function Krisztián Pintér ()  Pseudocode S

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-14 07:18:05
10Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

Add to Reading List

Source URL: password-hashing.net

Language: English