PBKDF2

Results: 49



#Item
31Password / PBKDF2 / Brute-force attack / Bcrypt / Crypt / Key stretching / Rainbow table / Cryptography / Key management / Key derivation function

scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2015-01-21 18:21:31
32Password / One-time password / Cryptographic software / Two-factor authentication / PBKDF2 / Salt / Transaction authentication number / Computer network security / Cryptographic protocols / Security / Computer security / Access control

Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: •

Add to Reading List

Source URL: www.dashlane.com

Language: English - Date: 2014-12-08 17:29:08
33Hashing / Search algorithms / Password / SHA-2 / Hash function / Crypt / Salt / PBKDF2 / Bcrypt / Cryptography / Cryptographic hash functions / Cryptographic software

Rig: A simple, secure and flexible design for Password Hashing Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India {donghoon,arpanj,swe

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-07 03:55:02
34FIPS 140-2 / PBKDF2 / Advanced Encryption Standard / Zeroisation / FIPS 140 / Crypto++ / Microsoft CryptoAPI / Cryptography / Cryptography standards / HMAC

Cryptographic Module for CipherCloud Gateway Version 1.0 FIPS[removed]Level 1 Security Policy Version Number: 1.8 Date: August 14, 2014

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-18 14:40:42
35Cryptography standards / Elliptic curve cryptography / HMAC / SHA-1 / SHA-2 / Key size / FIPS 140-2 / PBKDF2 / Crypto++ / Cryptography / Cryptographic software / Cryptographic hash functions

RSA BSAFE Crypto-C Micro Edition[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-24 12:10:48
36PBKDF2 / HMAC / FIPS 140 / Key generation / Cryptographic hash function / SHA-1 / Critical Security Parameter / PKCS / Microsoft CryptoAPI / Cryptography / Cryptography standards / FIPS 140-2

FSCLM PPC Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
37PBKDF2 / HMAC / FIPS 140 / Key generation / Cryptographic hash function / SHA-1 / Critical Security Parameter / PKCS / Microsoft CryptoAPI / Cryptography / Cryptography standards / FIPS 140-2

FSCLM PPC Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
38Passphrase / NetBSD / /dev/random / PKCS / PBKDF2 / File system / Key generation / Crypt / Cryptography / Cryptography standards / Randomness

CGDCONFIG (8) NetBSD System Manager’s Manual CGDCONFIG (8)

Add to Reading List

Source URL: www.imrryr.org

Language: English - Date: 2004-02-26 15:48:53
39Computer security / Mozilla add-ons / Key management / Password / LastPass Password Manager / PBKDF2 / Keychain / Key derivation function / Crypt / Cryptography / Software / Cryptographic software

“Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd. {a.belenko, d.sklyarov} @ elcomsoft . com http://www.elcomsoft.com

Add to Reading List

Source URL: www.elcomsoft.com

Language: English - Date: 2014-01-15 02:15:56
40Cryptographic software / Cryptographic hash functions / Password / Keychain / KeePass / Crypt / LastPass Password Manager / Passphrase / PBKDF2 / Software / Cryptography / Computer security

Programming Assignment 2 Winter 2014 CS 255: Intro to Cryptography Due Feb. 21, 11:59pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-02-07 16:58:58
UPDATE