DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Passphrase
Passphrase
NSA Vs. Encryption Article Written by Datto Developer Dan Fuhry First Appeared on Mspmentor.Com in November 2013
Analysis of Password Cracking Methods & Applications
Implementation and Performance Analysis of PBKDF2, Bcrypt, Scrypt Algorithms
Key Derivation Functions and Their GPU Implementation
Thread Commissioning White Paper
Harden Zero Knowledge Password Proofs Against Offline Dictionary
II-2.03 Encryption Policy
Effect of Grammar on Security of Long Passwords
Securezip User Guide
Analysis and Processing of Cryptographic Protocols
Probabilistic Passphrase Cracking
8 Steps to a Strong Password, Infographic
Security Analysis of Truecrypt
Improving Recall and Security of Passphrases Through Use of Mnemonics
CPSC 467: Cryptography and Computer Security
Truecrypt V5.0
On the Weaknesses of PBKDF2 ⋆
Key Agreement Protocol and Key Exchange Protocol
Top View
802.11I Authentication and Key Management (AKM)
Practical Password Cracking
Linguistic Cracking of Passphrases Using Markov Chains
STANDARD NAME Security Passphrase Standards STANDARD NUMBER 15.01.01 STANDARD SECTION Information Technology EFFECTIVE DATE 8/11/2014
Symantec White Paper
STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL 1. Introduction Password-Based Key Derivation Functi
How to Update Your Password to a Passphrase
Smartsecure Software-Based Encryption
Efficient Implementation of IEEE 802.11I Wi-Fi Security (WPA2-PSK) Standard Using FPGA Atal Bajracharya Grand Valley State University
Password/Passphrase Standard
NIST SP 800-132, Recommendation for Password-Based Key Derivation
Passwords Management Via Split-Key
STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL 1. Introduction Password-Based Key Derivation Functi
Cryptography — Public
Modern Password Security for Users User-Focused Recommendations for Creating and Storing Passwords
A Standards for Authentication and Key Establishment
Cryptography for Dummies.Pdf
Argon2 Security Margin for Disk Encryption Passwords
Efficient Password Authenticated Key Exchange Based On
Security Analysis of Cryptsetup/LUKS
NIST's New Password Rule Book
Using Encryption Facility for Openpgp
Password-Hashing Status
Efficient Implementation of Password-Based Authenticated Key
Netapp Volume Encryption Power Guide
Impedances of Memorable Passphrase Design on Augmented Cognition
Cracking Weak Passphrases Using Publicly-Available Sources
Open Crypto Audit Project Truecrypt Cryptographic Review
Authentication: Passwords
Encryption Using Windows Or Truecrypt
Key Derivation Function: an Essential (And Usually Transparent) Component of Real-World Applications
End-To-End Encryption July 13, 2021
An FPGA Architecture for the Recovery of WPA/WPA2 Keys" (2014)
How Whole Disk Encryption Works a PGP Corporation White Paper
Enterprise-Strength Password Management
Raw Slides (Pdf)
Information Security
Key Agreement Protocols and Their Security Analysis
Enhancing Password Based Key Derivation Techniques Passwordscon 2014 Presented by Stephen Lombardo & Nick Parker Sqlcipher
Authentication and Encryption Design Table of Contents
Cryptography
On the Weaknesses of PBKDF2 ⋆
Cryptographic Methods: Why Use Cryptography?