DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Bcrypt
Bcrypt
GPU-Based Password Cracking on the Security of Password Hashing Schemes Regarding Advances in Graphics Processing Units
PHC: Status Quo
Modern Password Security for System Designers What to Consider When Building a Password-Based Authentication System
Authentication Requirements in Cryptography
Package 'Bcrypt'
Bcrypt Recommended Salt Rounds
UGRD 2015 Spring Bugg Chris.Pdf (464.4Kb)
Implementation and Performance Analysis of PBKDF2, Bcrypt, Scrypt Algorithms
A Survey of Password Attacks and Safe Hashing Algorithms
Just in Time Hashing
Using Improved D-HMAC for Password Storage
Lab 3B Hashing Implementation This Lab Outlines Some Implementations for Hashing Methods
Two Provably Secure Password Hashing Algorithms
Password Storing Functions Bcrypt and Scrypt
Bad Cryptography Bruce Barnett Who Am I?
Keep All Secrets Encrypted & Secure
On the Economics of Offline Password Cracking
Evaluation of Password Hashing Schemes in Open Source Web
Top View
Practice Problem Set 3: Applied Crypto Potpourri Solutions
Pycryptodome Documentation Release 3.10.4
Understanding How to Prevent Sensitive Data Exposure
CHAPTER 19 Android User Enabled Security: Passwords and Gesture
Open Sesame the Password Hashing Competition and Argon2 Jos Wetzels
Developer Cryptography Best Practices
Lightweight Password Hashing Scheme for Embedded Systems
Security 101 Image Attribution: Randall Munroe ELCA For
Whirlwind: a New Cryptographic Hash Function
View the Index
Method for Storing User Password Securely
OWASP Threat Model for Secure Password Storage Is Psart of the Appsec Knowledge Series
Algorithms, Key Size and Parameters Report – 2014
SHA-1 Hash Collision Found CS 166: Information Security Password Cracking
How to Choose an Authenticated Encryption Mode I'm a Cryptographer and Research Professor at Johns If You've Hung Around This Blog for a While, You Hopkins University
High-Speed Implementation of Bcrypt Password Search Using Special-Purpose Hardware
Securing Password Storage
Raw Slides (Pdf)
A Future-Adaptable Password Scheme
Authenticated and Resilient Disk Encryption
A Novel SQL Injection Prevention Technique Using Data Hashing
The Cryptographic Implications of the Linkedin Data Breach
Passlib Documentation Release 1.7.4
Implementation of the Catena Password-Scrambling Framework
Password-Hashing Status
Cryptographic Hash Functions
Password Hashing Competition - Survey and Benchmark
An Enhanced Hash-Based Message Authentication Code Using Bcrypt
What Is a Rainbow Table Attack? Technical: a Rainbow Table Attack Is When a Hacker Wants to Compromise the Login Credentials of Users in an Online System
A Hybrid Approach for Augmenting Password Security Using Argon2i Hashing and AES Scheme
Classification of Cryptographic Libraries
VAASAN AMMATTIKORKEAKOULU UNIVERSITY of APPLIED SCIENCES Degree Programme in Information Technology
Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking
COBRA: a Parallelizable Authenticated Online Cipher Without Block Cipher Inverse
Analysis and Design of Authentication and Encryption Algorithms for Secure Cloud Systems
Secure Password Storage.Pptx
Performance of Password Guessing Enumerators Under Cracking Conditions Mathieu Valois, Patrick Lacharme, Jean-Marie Le Bars
Introduction to the Hash Function As a Personal Data Pseudonymisation Technique
Cryptography in Python Hashes, ECC and ECDSA, Eth Keys Library ECDSA in Python: Generate / Load Keys
Overview of Web Password Hashing Using Salt Technique
Crashcoursecrypto Cryptography 101 for Developers
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
Information and Password Attacks on Social Networks: an Argument for Cryptography
Requirements of Message Authentication Code
Security Reductions of the Second Round SHA-3 Candidates
Lecture 24: the Dictionary Attack and the Rainbow-Table Attack on Password Protected Systems
Botan Reference Guide Release 2.18.1
Microsoft Corporation Windows Embedded Compact Cryptographic Primitives Library (BCRYPT.DLL) As Described in FIPS PUB 140‐2
A Study on the Security of Password Hashing Based on GPU Based, Password Cracking Using High-Performance Cloud Computing Parves Kamal
[email protected]
Nettle Manual for the Nettle Library Version 3.4