DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» PBKDF2
PBKDF2
BLAKE2: Simpler, Smaller, Fast As MD5
Implementation and Performance Analysis of PBKDF2, Bcrypt, Scrypt Algorithms
Key Derivation Functions and Their GPU Implementation
Playing Defense with PBKDF2: Hashcat and the 1Password Agile Keychain from the Defender’S Point of View a (Rough) Day in the Life of a Defender
Just in Time Hashing
Design and Analysis of Password-Based Key Derivation Functions
Lab 3B Hashing Implementation This Lab Outlines Some Implementations for Hashing Methods
Password Storing Functions Bcrypt and Scrypt
Bad Cryptography Bruce Barnett Who Am I?
The Hash Function BLAKE
Customizing the Number of Iterations for PBKDF2
On the Economics of Offline Password Cracking
Pycryptodome Documentation Release 3.10.4
Understanding How to Prevent Sensitive Data Exposure
Understanding Optimizations and Measuring Performances of PBKDF2 ?
On the Weaknesses of PBKDF2 ⋆
Open Sesame the Password Hashing Competition and Argon2 Jos Wetzels
Practical Password Cracking
Top View
Acceleration Attacks on PBKDF2 Or, What Is Inside the Black-Box of Oclhashcat?
STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL 1. Introduction Password-Based Key Derivation Functi
ANSSI : Guide De Sélection D'algorithmes Cryptographiques
Lightweight Password Hashing Scheme for Embedded Systems
SOGIS Agreed Cryptographic Mechanisms
View the Index
NIST SP 800-132, Recommendation for Password-Based Key Derivation
OWASP Threat Model for Secure Password Storage Is Psart of the Appsec Knowledge Series
STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL 1. Introduction Password-Based Key Derivation Functi
Algorithms, Key Size and Parameters Report – 2014
Securing Password Storage
Credential Security: Important Things to Know About Storing Your Identity
Rig, a Password Hashing Scheme Which Aims to Address the Above Mentioned Requirements
Passwords Are Better with Salt - Hashing, Salting and Key Stretching in Kdb+ John Ludlow
Improve the Integrity of Data Using Hashing Algorithms P Varaprasada Rao, S Govinda Rao , P Chandrasekhar Reddy, G R Sakthidharan , Y Manoj Kumar
Password-Hashing Status
Cryptographic Hash Functions
Password Hashing Competition - Survey and Benchmark
Integrity and Hash Functions
Design and Analysis of Password-Based Authentication Systems
Guidelines on Cryptographic Algorithms Usage and Key Management
A New SHA-3 Implementation on Low-End Microcontrollers
Secure Communication Protocol for a Low-Bandwidth Audio Channel
Cryptanalysis of Secure Hash Password Technique (CSHPT) in Linux
On the Security Analysis of PBKDF2 in Openoffice
Brains Over Brawn: Intelligent Password Recovery
(Bouncy Castle FIPS Java API) User Guide Version
Overview of Web Password Hashing Using Salt Technique
NIST Cryptographic Standards and Guidelines Development Program Briefing Book
Password-Based Openssl Encryption Analysis of Key Derivation Protocol
Useful Password Hashing: How to Waste Computing Cycles with Style
Botan Reference Guide Release 2.18.1
On the Weaknesses of PBKDF2 ⋆
Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2