Scrypt

Results: 25



#Item
1Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de

Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-17 04:25:27
2Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au

Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
3Microsoft Word - Vert_Website Paper by r0ach.rtf

Microsoft Word - Vert_Website Paper by r0ach.rtf

Add to Reading List

Source URL: vertcoin.org

Language: English - Date: 2014-07-16 07:51:34
4Cache Attack Against scrypt Advisor(s): Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Cache Attack Against scrypt Advisor(s): Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
5yescrypt - a Password Hashing Competition submission  Name of the submitted scheme: Name and email address of the submitter(s): Originally submitted on: This revision:

yescrypt - a Password Hashing Competition submission Name of the submitted scheme: Name and email address of the submitter(s): Originally submitted on: This revision:

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-10-25 04:56:20
6Argon2 Designers: Alex Biryukov, Daniel Dinu, and Dmitry Khovratovich University of Luxembourg, Luxembourg , ,  https://www.cryptolux.org/index.php/Argo

Argon2 Designers: Alex Biryukov, Daniel Dinu, and Dmitry Khovratovich University of Luxembourg, Luxembourg , , https://www.cryptolux.org/index.php/Argo

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-07-22 02:06:59
7Ω  Omega Crypt (ocrypt) Brandon Enright  http://www.brandonenright.net/ocrypt/

Ω Omega Crypt (ocrypt) Brandon Enright http://www.brandonenright.net/ocrypt/

Add to Reading List

Source URL: password-hashing.net

Language: English
8Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-10-16 08:19:35
9Developing with Catalyst as securely as possible What do I need to do? ● Catalyst generally tries to help you be secure and most of the plugins are pretty

Developing with Catalyst as securely as possible What do I need to do? ● Catalyst generally tries to help you be secure and most of the plugins are pretty

Add to Reading List

Source URL: birmingham.pm.org

Language: English - Date: 2014-12-04 13:54:55
10Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

Add to Reading List

Source URL: password-hashing.net

Language: English