1![Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de](https://www.pdfsearch.io/img/21b2d53a09adfff734b1fdda01b679b5.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2014-12-17 04:25:27
|
---|
2![Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au](https://www.pdfsearch.io/img/55f22e074b2dac04b27df7dde828f000.jpg) | Add to Reading ListSource URL: www.iaik.tugraz.atLanguage: English - Date: 2015-09-08 06:00:03
|
---|
3![Microsoft Word - Vert_Website Paper by r0ach.rtf Microsoft Word - Vert_Website Paper by r0ach.rtf](https://www.pdfsearch.io/img/a39159086125a4ab700fa25bc2fe7499.jpg) | Add to Reading ListSource URL: vertcoin.orgLanguage: English - Date: 2014-07-16 07:51:34
|
---|
4![Cache Attack Against scrypt Advisor(s): Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation Cache Attack Against scrypt Advisor(s): Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation](https://www.pdfsearch.io/img/4fecbc18db61bf02a459872b8733500c.jpg) | Add to Reading ListSource URL: www.iaik.tugraz.atLanguage: English - Date: 2015-11-30 11:00:03
|
---|
5![yescrypt - a Password Hashing Competition submission Name of the submitted scheme: Name and email address of the submitter(s): Originally submitted on: This revision: yescrypt - a Password Hashing Competition submission Name of the submitted scheme: Name and email address of the submitter(s): Originally submitted on: This revision:](https://www.pdfsearch.io/img/f5c558a5ee9dbf779a02eb5dc07c0709.jpg) | Add to Reading ListSource URL: password-hashing.netLanguage: English - Date: 2015-10-25 04:56:20
|
---|
6![Argon2 Designers: Alex Biryukov, Daniel Dinu, and Dmitry Khovratovich University of Luxembourg, Luxembourg , , https://www.cryptolux.org/index.php/Argo Argon2 Designers: Alex Biryukov, Daniel Dinu, and Dmitry Khovratovich University of Luxembourg, Luxembourg , , https://www.cryptolux.org/index.php/Argo](https://www.pdfsearch.io/img/1ae75e1e472e1f4d3cd1f15291759632.jpg) | Add to Reading ListSource URL: password-hashing.netLanguage: English - Date: 2015-07-22 02:06:59
|
---|
7![Ω Omega Crypt (ocrypt) Brandon Enright http://www.brandonenright.net/ocrypt/ Ω Omega Crypt (ocrypt) Brandon Enright http://www.brandonenright.net/ocrypt/](https://www.pdfsearch.io/img/f8ac9bcc7da0f4a2b84f66428c175917.jpg) | Add to Reading ListSource URL: password-hashing.netLanguage: English |
---|
8![Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India](https://www.pdfsearch.io/img/18b0471ece8bfbdf8bfbb1e783df9981.jpg) | Add to Reading ListSource URL: password-hashing.netLanguage: English - Date: 2014-10-16 08:19:35
|
---|
9![Developing with Catalyst as securely as possible
What do I need to do? ● Catalyst generally tries to help you be secure and most of the plugins are pretty Developing with Catalyst as securely as possible
What do I need to do? ● Catalyst generally tries to help you be secure and most of the plugins are pretty](https://www.pdfsearch.io/img/55e36c6728cfe1654ebb668422712930.jpg) | Add to Reading ListSource URL: birmingham.pm.orgLanguage: English - Date: 2014-12-04 13:54:55
|
---|
10![Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet](https://www.pdfsearch.io/img/018b28c68177a273854edf3fa0fcc394.jpg) | Add to Reading ListSource URL: password-hashing.netLanguage: English |
---|