DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Colin Percival
Colin Percival
Class-Action Lawsuit
Just in Time Hashing
Using Improved D-HMAC for Password Storage
Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions
Scrypt: a New Key Derivation Function Doing Our Best to Thwart Tlas Armed with Asics
Bandwidth Hard Functions for ASIC Resistance
Secure Password Storing Using Prime Decomposition Chaovalit Somboonpattanakit and Nawaporn Wisitpongphan
Scrypt: a Key Derivation Function Doing Our Best to Thwart Tlas Armed with Asics
STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL 1. Introduction Password-Based Key Derivation Functi
Everything You Need to Know About Cryptography in 1 Hour
STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL 1. Introduction Password-Based Key Derivation Functi
Minimizing Cache Timing Attack Using Dynamic Cache Flushing (DCF) Algorithm
Neoscrypt, a Strong Memory Intensive Key Derivation Function
Coding by Contract: Why the Fine Print Matters
23 Years of Software Side Channel Attacks
On Resilient Password-Based Key Derivation Functions
Password Hashing Competition - Survey and Benchmark
Everything You Need to Know About Cryptography in 1 Hour
Top View
Stealing Intel Secrets from SGX Enclaves Via Speculative Execution
Memory-Demanding Password Scrambling
Scrypt: a Key Derivation Function Doing Our Best to Thwart Tlas Armed with Asics
Kleespectre: Detecting Information Leakage Through Speculative Cache Attacks Via Symbolic Execution