Back to Results
First PageMeta Content
Password / Salt / Challenge-response authentication / Security token / Random password generator / Passwd / Passphrase / One-time password / Crypt / Security / Computer security / Cryptography


This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi
Add to Reading List

Document Date: 2011-07-10 02:35:13


Open Document

File Size: 309,25 KB

Share Result on Facebook

Company

Bell Laboratories / CRC Press Inc. / /

Country

United States / /

IndustryTerm

knowledge-based protocols / by-product / open communications networks / exhaustive search attacks / password algorithm / host processor / entity authentication protocol / backup media / password search / unsecured telephone network / authenticated key establishment protocols / entity authentication protocols / software applications / telephone modem / on-line identity verification / identification protocols / trusted communications lines / wireless link / cellular telephony / challengeresponse protocols / identification protocol / public communications lines / on-line dictionaries / remote office site / crypt password algorithm / overall algorithm / exhaustive search / challenge-response protocols / encryption algorithm / actual communications / software application / communications permissions / /

OperatingSystem

UNIX / /

Organization

C. / Entity Authentication Chapter / US Federal Reserve / Identification and Entity Authentication Chapter / /

Product

UNIX / /

Technology

encryption / identification protocols / Cryptography / host processor / DES chips / challengeresponse protocols / public key / overall algorithm / sorting algorithm / encryption algorithm / UNIX / ASCII / UNIX password algorithm / entity authentication protocols / challenge-response protocols / identification protocol / UNIX crypt password algorithm / private key / function vs. encryption / entity authentication protocol / zero-knowledge-based protocols / operating system / digital signature / authenticated key establishment protocols / iterated encryption / integrated circuit / /

URL

www.cacr.math.uwaterloo.ca/hac / /

SocialTag