PBKDF2

Results: 49



#Item
1Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de

Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-17 04:25:27
2Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au

Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
3Cache Attack Against scrypt Advisor(s): Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Cache Attack Against scrypt Advisor(s): Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
4Ω  Omega Crypt (ocrypt) Brandon Enright  http://www.brandonenright.net/ocrypt/

Ω Omega Crypt (ocrypt) Brandon Enright http://www.brandonenright.net/ocrypt/

Add to Reading List

Source URL: password-hashing.net

Language: English
5Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-10-16 08:19:35
6Developing with Catalyst as securely as possible What do I need to do? ● Catalyst generally tries to help you be secure and most of the plugins are pretty

Developing with Catalyst as securely as possible What do I need to do? ● Catalyst generally tries to help you be secure and most of the plugins are pretty

Add to Reading List

Source URL: birmingham.pm.org

Language: English - Date: 2014-12-04 13:54:55
7Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

Add to Reading List

Source URL: password-hashing.net

Language: English
8The M AKWA Password Hashing Function Specifications v1.1 Thomas Pornin, <> April 22, 2015  Abstract

The M AKWA Password Hashing Function Specifications v1.1 Thomas Pornin, <> April 22, 2015 Abstract

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-04-27 09:52:37
9The Catena Password-Scrambling Framework Christian Forler∗ Stefan Lucks†

The Catena Password-Scrambling Framework Christian Forler∗ Stefan Lucks†

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-09-29 12:17:24
10scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

Add to Reading List

Source URL: www.daemonology.net

Language: English - Date: 2009-06-11 07:30:54