DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Key derivation function

Key derivation function

  • Reconsidering the Security Bound of AES-GCM-SIV

    Reconsidering the Security Bound of AES-GCM-SIV

  • A Password-Based Key Derivation Algorithm Using the KBRP Method

    A Password-Based Key Derivation Algorithm Using the KBRP Method

  • Implementation and Performance Analysis of PBKDF2, Bcrypt, Scrypt Algorithms

    Implementation and Performance Analysis of PBKDF2, Bcrypt, Scrypt Algorithms

  • Security Policy: Informacast Java Crypto Library

    Security Policy: Informacast Java Crypto Library

  • Key Derivation Functions and Their GPU Implementation

    Key Derivation Functions and Their GPU Implementation

  • The Summation-Truncation Hybrid: Reusing Discarded Bits for Free

    The Summation-Truncation Hybrid: Reusing Discarded Bits for Free

  • Using the Cryptographic Service Engine (CSE)

    Using the Cryptographic Service Engine (CSE)

  • Basic Security

    Basic Security

  • Using Improved D-HMAC for Password Storage

    Using Improved D-HMAC for Password Storage

  • Design and Analysis of Password-Based Key Derivation Functions

    Design and Analysis of Password-Based Key Derivation Functions

  • Better Bounds for Block Cipher Modes of Operation Via Nonce-Based Key Derivation

    Better Bounds for Block Cipher Modes of Operation Via Nonce-Based Key Derivation

  • Cryptographic Extraction and Key Derivation: the HKDF Scheme

    Cryptographic Extraction and Key Derivation: the HKDF Scheme

  • Evaluation of Password Hashing Schemes in Open Source Web

    Evaluation of Password Hashing Schemes in Open Source Web

  • Key Derivation Function Explanations

    Key Derivation Function Explanations

  • Recommendation for Key Derivation Through Extraction-Then-Expansion

    Recommendation for Key Derivation Through Extraction-Then-Expansion

  • Understanding Optimizations and Measuring Performances of PBKDF2 ?

    Understanding Optimizations and Measuring Performances of PBKDF2 ?

  • Key Management Systems at the Cloud Scale

    Key Management Systems at the Cloud Scale

  • On the Weaknesses of PBKDF2 ⋆

    On the Weaknesses of PBKDF2 ⋆

Top View
  • Comments Received on the Recommendation for Draft SP 800-56 Key Establishment Schemes
  • Acceleration Attacks on PBKDF2 Or, What Is Inside the Black-Box of Oclhashcat?
  • STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL 1. Introduction Password-Based Key Derivation Functi
  • SEC 1: Elliptic Curve Cryptography
  • View the Index
  • NIST SP 800-132, Recommendation for Password-Based Key Derivation
  • Evaluating Elliptic Curve Based Kems in the Light of Pairings
  • STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL 1. Introduction Password-Based Key Derivation Functi
  • Recommendation for Existing Application-Specific Key Derivation Functions
  • FIPS 202, the SHA-3 Standard Overview and Recommendations
  • Ensemble Approach to Failure-Resistant Password-Based Key Derivation Functions
  • The SHA-3 FIPS
  • Cryptographic Extraction and Key Derivation: the HKDF Scheme
  • Cyclonecrypto | Embedded Cryptographic Toolkit for ARM
  • The Cryptographic Implications of the Linkedin Data Breach
  • NIST Special Publication 800-107 Revision 1, Recommendation For
  • Password-Hashing Status
  • The M3lcrypt Password Based Key Derivation Function 1 Introduction


© 2024 Docslib.org    Feedback