DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Pepper (cryptography)
Pepper (cryptography)
Argon and Argon2
CASH: a Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection
Rifflescrambler – a Memory-Hard Password Storing Function ⋆
Hash Functions
Cs 255 (Introduction to Cryptography)
Sketch of Lecture 34 Mon, 4/16/2018
A Survey of Password Attacks and Safe Hashing Algorithms
Client-CASH: Protecting Master Passwords Against Offline Attacks Jeremiah Blocki, Anirudh Sridhar Motivation: Password Storage
Using Improved D-HMAC for Password Storage
Privacyidea Documentation Release 2.3
Cryptacus Newsletter
Providing Confidentiality, Data Integrity and Authentication of Transmitted Information
Analyse, Modellierung Und Hashcat-Basierte Implementierung Von Angriffen Auf Passwortgeschutzte¨ Systeme Unter Einbeziehung Des Faktors Mensch
Practical Password Hardening Based on TLS
Sketch of Lecture 31 Fri, 4/17/2020
XEP-0438: Best Practices for Password Hashing and Storage
Release 2.22 Cornelius Kölbel
Practical Password Cracking
Top View
Andy Smith, Amadeus Software Ltd Safer Anonymization with Secure Hash Algorithm Andy Smith Amadeus Software Ltd
The Linkedin Hack: Understanding Why It Was So Easy to Crack the Passwords
Adding Salt to Pepper a Structured Security Assessment Over a Humanoid Robot a Structured Security Assessment Over a Humanoid Robot
Relativity Desktop Client Guide
Cryptanalyses of Some Multimedia Encryption Schemes
SHA-1 Hash Collision Found CS 166: Information Security Password Cracking
Grøstl – a SHA-3 Candidate ∗
List of More Than 330 Entries
Implementation of the Catena Password-Scrambling Framework
Passwords and Hacking: the Jargon of Hashing, Salting and SHA-2 Explained
Brute Force Attack on UNIX Passwords with SIMD
Catena: a Memory-Consuming Password-Scrambling Framework
A Novel Approach to Thwart Security Attacks on Mobile Pattern Authentication Systems
A Study of Image Compression and SHA 256 Encryption Algorithms for Secure Transmission
Rifflescrambler – a Memory-Hard Password Storing Function
An In-Depth Look Into Cryptographic Hashing Algorithms
STARK Friendly Hash – Survey and Recommendation
An Evaluation of Secure Storage of Authentication Data
Open Source Used in 8821 11.0(6)
Cryptographic Hash Function
Protecting Web Passwords Using Trusted Execution Environments
Twocats (And Skinnycat): a Compute Time and Sequential Memory Hard Password Hashing Scheme
On the Economics of Offline Password Cracking
8: Password-Hashing Basics
Secure Offline Verification of One-Time Passwords
Cryptography and Computer Security
Catena Password-Scrambling Framework
Efficient and Secure Image Availability and Content Protection
EC-OPRF: Oblivious Pseudorandom Functions Using Elliptic Curves