PBKDF2

Results: 49



#Item
11Cryptography / Computer access control / PBKDF2 / Pseudorandom function family / Password / Challengeresponse authentication / Security token

The Pythia PRF Service Adam Everspaugh? , Rahul Chatterjee? , Samuel Scott?? , Ari Juels† , and Thomas Ristenpart‡ ? University of Wisconsin–Madison, {ace,rchat}@cs.wisc.edu ?? Royal Holloway, University of London,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-09-17 14:36:44
12PBKDF2 / Password manager / Password / Cryptographic software / Passphrase / Key management / Trusted Platform Module / Key stretching / Sticky Password Manager / Cryptography / Computer security / Security

“Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd.

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 15:32:02
13Cryptography / Password / HTTP cookie / JavaScript / Challenge-response authentication / Salt / Crypt / Cross-site scripting / PBKDF2 / Computer security / Computing / Cyberwarfare

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II Solutions

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2014-07-10 13:02:28
14Computer security / Mozilla add-ons / Key management / Password / LastPass Password Manager / PBKDF2 / Keychain / Key derivation function / Crypt / Cryptography / Software / Cryptographic software

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 15:32:02
15PBKDF2 / Password manager / Password / Cryptographic software / Passphrase / Key management / Trusted Platform Module / Key stretching / Sticky Password Manager / Cryptography / Computer security / Security

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 15:32:02
16Internet protocols / Internet standards / Cryptographic protocols / Key derivation function / PBKDF2 / Online Certificate Status Protocol / Digital signature / Password / Steganography / Cryptography / Key management / Public-key cryptography

Security  Highlights   The  IBM  Mobile  Iden7ty  framework  has  embraced  several  industry  standards  to  allow  applica7on   developers  to  create  secure  s

Add to Reading List

Source URL: www-01.ibm.com

Language: English - Date: 2014-11-20 11:27:30
17Key derivation function / Passwd / PBKDF2 / Crypt / Key / Shadow password / Key stretching / Cryptography / Key management / Password

scrypt: A key derivation function - Doing our best to thwart TLAs armed with ASICs

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-04 07:18:10
18PBKDF2 / Password / Salt / Crypt / LastPass Password Manager / SHA-2 / Bcrypt / SHA-1 / MD5 / Cryptography / Cryptographic hash functions / Cryptographic software

Hashing Algorithms: The Good, the Bad, and the Fail Steve Thomas “Sc00bz” Passwords^12 TobTu.com/passwords12

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-06 12:18:45
19SCSI / C dynamic memory allocation / PBKDF2 / Computing / RAID / Computer architecture

Softraid: OpenBSD’s virtual HBA, with benefits Marco Peereboom OpenBSD The transformations are arbitrarily complex and span a wide range of uses. For example, a discipline could mirror an I/O, stripe an I/O or encrypt

Add to Reading List

Source URL: www.openbsd.org.my

Language: English - Date: 2010-05-17 03:46:35
20SCSI / C dynamic memory allocation / PBKDF2 / Computing / RAID / Computer architecture

Softraid: OpenBSD’s virtual HBA, with benefits Marco Peereboom OpenBSD The transformations are arbitrarily complex and span a wide range of uses. For example, a discipline could mirror an I/O, stripe an I/O or encrypt

Add to Reading List

Source URL: openbsd.md5.com.ar

Language: English - Date: 2010-03-17 04:09:19
UPDATE