DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Salt (cryptography)

Salt (cryptography)

  • Modern Password Security for System Designers What to Consider When Building a Password-Based Authentication System

    Modern Password Security for System Designers What to Consider When Building a Password-Based Authentication System

  • Implementation and Performance Analysis of PBKDF2, Bcrypt, Scrypt Algorithms

    Implementation and Performance Analysis of PBKDF2, Bcrypt, Scrypt Algorithms

  • Key Derivation Functions and Their GPU Implementation

    Key Derivation Functions and Their GPU Implementation

  • Hash Functions

    Hash Functions

  • Salting Vs Stretching Passwords for Enterprise Security

    Salting Vs Stretching Passwords for Enterprise Security

  • Analysis of Password and Salt Combination Scheme to Improve Hash Algorithm Security

    Analysis of Password and Salt Combination Scheme to Improve Hash Algorithm Security

  • Lab 3: MD5 and Rainbow Tables

    Lab 3: MD5 and Rainbow Tables

  • Just in Time Hashing

    Just in Time Hashing

  • Using Improved D-HMAC for Password Storage

    Using Improved D-HMAC for Password Storage

  • Design and Analysis of Password-Based Key Derivation Functions

    Design and Analysis of Password-Based Key Derivation Functions

  • Customizing the Number of Iterations for PBKDF2

    Customizing the Number of Iterations for PBKDF2

  • Cryptographic Extraction and Key Derivation: the HKDF Scheme

    Cryptographic Extraction and Key Derivation: the HKDF Scheme

  • Practical Cryptographic Data Integrity Protection with Full Disk Encryption Extended Version

    Practical Cryptographic Data Integrity Protection with Full Disk Encryption Extended Version

  • Pycryptodome Documentation Release 3.10.4

    Pycryptodome Documentation Release 3.10.4

  • Key Derivation Function Explanations

    Key Derivation Function Explanations

  • Recommendation for Key Derivation Through Extraction-Then-Expansion

    Recommendation for Key Derivation Through Extraction-Then-Expansion

  • Cryptographic (In)Security in Android Apps an Empirical Analysis

    Cryptographic (In)Security in Android Apps an Empirical Analysis

  • Practical Password Cracking

    Practical Password Cracking

Top View
  • Acceleration Attacks on PBKDF2 Or, What Is Inside the Black-Box of Oclhashcat?
  • Passwords, Hashes and Rainbow Tables 1
  • High Performance Password Cracking by Implementing Rainbow Tables on Nvidia Graphics Cards (Isecrack) Russell Edward Graves Iowa State University
  • Password Protection for Modern Operating Systems
  • Tell MD5 to SCRAM!
  • NIST SP 800-132, Recommendation for Password-Based Key Derivation
  • OWASP Threat Model for Secure Password Storage Is Psart of the Appsec Knowledge Series
  • Securing Password Storage
  • Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
  • Ariadne Thread and Salt
  • A Future-Adaptable Password Scheme
  • Cryptographic Extraction and Key Derivation: the HKDF Scheme
  • Cracking Salted Hashes
  • Secure Applications of Low-Entropy Keys
  • Applied Cryptography Knowledge Area (Draft for Comment)
  • Cryptanalysis of the 10-Round Hash and Full Compression Function of Shavite-3-512?
  • PSA Cryptography API 1.0
  • Passwords Are Better with Salt - Hashing, Salting and Key Stretching in Kdb+ John Ludlow


© 2024 Docslib.org    Feedback