DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Key derivation function
Key derivation function
Reconsidering the Security Bound of AES-GCM-SIV
A Password-Based Key Derivation Algorithm Using the KBRP Method
Implementation and Performance Analysis of PBKDF2, Bcrypt, Scrypt Algorithms
Security Policy: Informacast Java Crypto Library
Key Derivation Functions and Their GPU Implementation
The Summation-Truncation Hybrid: Reusing Discarded Bits for Free
Using the Cryptographic Service Engine (CSE)
Basic Security
Using Improved D-HMAC for Password Storage
Design and Analysis of Password-Based Key Derivation Functions
Better Bounds for Block Cipher Modes of Operation Via Nonce-Based Key Derivation
Cryptographic Extraction and Key Derivation: the HKDF Scheme
Evaluation of Password Hashing Schemes in Open Source Web
Key Derivation Function Explanations
Recommendation for Key Derivation Through Extraction-Then-Expansion
Understanding Optimizations and Measuring Performances of PBKDF2 ?
Key Management Systems at the Cloud Scale
On the Weaknesses of PBKDF2 ⋆
Top View
Comments Received on the Recommendation for Draft SP 800-56 Key Establishment Schemes
Acceleration Attacks on PBKDF2 Or, What Is Inside the Black-Box of Oclhashcat?
STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL 1. Introduction Password-Based Key Derivation Functi
SEC 1: Elliptic Curve Cryptography
View the Index
NIST SP 800-132, Recommendation for Password-Based Key Derivation
Evaluating Elliptic Curve Based Kems in the Light of Pairings
STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL 1. Introduction Password-Based Key Derivation Functi
Recommendation for Existing Application-Specific Key Derivation Functions
FIPS 202, the SHA-3 Standard Overview and Recommendations
Ensemble Approach to Failure-Resistant Password-Based Key Derivation Functions
The SHA-3 FIPS
Cryptographic Extraction and Key Derivation: the HKDF Scheme
Cyclonecrypto | Embedded Cryptographic Toolkit for ARM
The Cryptographic Implications of the Linkedin Data Breach
NIST Special Publication 800-107 Revision 1, Recommendation For
Password-Hashing Status
The M3lcrypt Password Based Key Derivation Function 1 Introduction
Cryptographic Hash Functions
Key Derivation Function: the SCKDF Scheme Chai Chuah, Edward Dawson, Leonie Simpson
Nist Sp 800-56C Rev
Symmetric Key Management: Key Derivation and Key Wrap
Recommendation for Password-Based Key Derivation Part 1: Storage Applications
Key Derivation Function Based on Stream Ciphers
The Keccak SHA-3 Submission
Vmware BC-FJA (Bouncy Castle FIPS Java API) Software Version: 1.0.0
Cryptanalysis of HMAC/NMAC-Whirlpool
ECRYPT II Yearly Report on Algorithms and Keysizes (2011-2012)
Nist Sp 800-108
A Scheme for the Generation of Strong Cryptographic Key Pairs Based on Fcmetrics
On the Security Analysis of PBKDF2 in Openoffice
LNCS 7459, Pp
Security Policy Version 2.0
AES-GCM-SIV: Specification and Analysis
Password-Based Openssl Encryption Analysis of Key Derivation Protocol
Recommendation for Key-Derivation Methods in Key-Establishment Schemes
Recommendation for Key Derivation Using Pseudorandom Functions (Revised)
Partitioning Oracle Attacks
Network Security User and Network Authentication
FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, August 2015
On the Weaknesses of PBKDF2 ⋆
Cryptographic Extraction and Key Derivation: the HKDF Scheme