First Page | Document Content | |
---|---|---|
![]() Date: 2010-01-10 04:31:20SHA-2 NIST hash function competition Crypt Hash function Skein Hash list Computer programming Artificial intelligence Key stretching Cryptographic hash functions Field-programmable gate array Computing | Source URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 459,44 KBShare Document on Facebook |
![]() | Communications DOI: anieLithium in Ammonia Creating Interfaces by Stretching the Solvent Is Key to MetallicDocID: 1rVBw - View Document |
![]() | Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.deDocID: 1rfah - View Document |
![]() | battcrypt (Blowfish All The Things) Steven Thomas (steve at tobtu dot com) Specification Symbols/functions **DocID: 1nqRi - View Document |
![]() | Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographicDocID: 1nnrX - View Document |
![]() | The Catena Password-Scrambling Framework Christian Forler∗ Stefan Lucks†DocID: 1ni75 - View Document |