DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Key stretching
Key stretching
GPU-Based Password Cracking on the Security of Password Hashing Schemes Regarding Advances in Graphics Processing Units
Security + Encryption Standards
Implementation and Performance Analysis of PBKDF2, Bcrypt, Scrypt Algorithms
A New Approach in Expanding the Hash Size of MD5
Computational Security and the Economics of Password Hacking
Authentication, Authorization and Transport Layer Security
Hybrid Password Authentication System
Cryptography Lecture 8 Digital Signatures, Hash Functions a Message Authentication Code Is What You Get from Symmetric Cryptography
Just in Time Hashing
Design and Analysis of Password-Based Key Derivation Functions
Implementing Cryptography Using Python® Shannon W
Protecting Passwords in the Event of a Password File Disclosure
Download The
Cryptographic Extraction and Key Derivation: the HKDF Scheme
On the Economics of Offline Password Cracking
Cryptographic Secure Password Storage System
Secure Password Storing Using Prime Decomposition Chaovalit Somboonpattanakit and Nawaporn Wisitpongphan
Authstore: Password-Based Authentication and Encrypted Data Storage in Untrusted Environments
Top View
Acceleration Attacks on PBKDF2 Or, What Is Inside the Black-Box of Oclhashcat?
STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL 1. Introduction Password-Based Key Derivation Functi
Secure Login System Using MD5 and AES Attribute Based Encryption Algorithm
Lightweight Password Hashing Scheme for Embedded Systems
STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL 1. Introduction Password-Based Key Derivation Functi
SHA-1 Hash Collision Found CS 166: Information Security Password Cracking
Securing Password Storage
Cryptographic Tools and Techniques
Secure Applications of Low-Entropy Keys
Neoscrypt, a Strong Memory Intensive Key Derivation Function
The Cryptographic Implications of the Linkedin Data Breach
Design and Analysis of Cryptographic Algorithms for Authentication
Enhancing Password Security Using a Hybrid Approach of Scrypt Hashing and AES Encryption
Passwords Are Better with Salt - Hashing, Salting and Key Stretching in Kdb+ John Ludlow
Password-Hashing Status
Security Review of the SHA-1 and MD5 Cryptographic Hash Algorithms
Twofish: a 128-Bit Block Cipher
The M3lcrypt Password Based Key Derivation Function 1 Introduction
Design and Analysis of Password-Based Authentication Systems
Security Analysis of MD5 Algorithm in Password Storage
MTAT.07.017 Applied Cryptography
Data Security
A Scheme for the Generation of Strong Cryptographic Key Pairs Based on Fcmetrics
Comptia Security+ SY0-501
Sha-1 and Md5 Cryptographic Hash Functions: Security Overview
Password-Based Openssl Encryption Analysis of Key Derivation Protocol
9: the SHA-3 Competition
8: Password-Hashing Basics
Network Security User and Network Authentication
A Secure Electronic Voting Software Application Based on Image Steganography and Cryptography
Cryptography
Jetico User Manual