DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Salt (cryptography)
Salt (cryptography)
Modern Password Security for System Designers What to Consider When Building a Password-Based Authentication System
Implementation and Performance Analysis of PBKDF2, Bcrypt, Scrypt Algorithms
Key Derivation Functions and Their GPU Implementation
Hash Functions
Salting Vs Stretching Passwords for Enterprise Security
Analysis of Password and Salt Combination Scheme to Improve Hash Algorithm Security
Lab 3: MD5 and Rainbow Tables
Just in Time Hashing
Using Improved D-HMAC for Password Storage
Design and Analysis of Password-Based Key Derivation Functions
Customizing the Number of Iterations for PBKDF2
Cryptographic Extraction and Key Derivation: the HKDF Scheme
Practical Cryptographic Data Integrity Protection with Full Disk Encryption Extended Version
Pycryptodome Documentation Release 3.10.4
Key Derivation Function Explanations
Recommendation for Key Derivation Through Extraction-Then-Expansion
Cryptographic (In)Security in Android Apps an Empirical Analysis
Practical Password Cracking
Top View
Acceleration Attacks on PBKDF2 Or, What Is Inside the Black-Box of Oclhashcat?
Passwords, Hashes and Rainbow Tables 1
High Performance Password Cracking by Implementing Rainbow Tables on Nvidia Graphics Cards (Isecrack) Russell Edward Graves Iowa State University
Password Protection for Modern Operating Systems
Tell MD5 to SCRAM!
NIST SP 800-132, Recommendation for Password-Based Key Derivation
OWASP Threat Model for Secure Password Storage Is Psart of the Appsec Knowledge Series
Securing Password Storage
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
Ariadne Thread and Salt
A Future-Adaptable Password Scheme
Cryptographic Extraction and Key Derivation: the HKDF Scheme
Cracking Salted Hashes
Secure Applications of Low-Entropy Keys
Applied Cryptography Knowledge Area (Draft for Comment)
Cryptanalysis of the 10-Round Hash and Full Compression Function of Shavite-3-512?
PSA Cryptography API 1.0
Passwords Are Better with Salt - Hashing, Salting and Key Stretching in Kdb+ John Ludlow
Cryptographic Hash Functions
Cryptographic Hash Functions
Nist Sp 800-56C Rev
What Is a Rainbow Table Attack? Technical: a Rainbow Table Attack Is When a Hacker Wants to Compromise the Login Credentials of Users in an Online System
Cryptography and Architectures for Computer Security Exam Code: 095947 (Old 090959), A.Y
Lecture 4 Data Encryption Standard (DES)
A Framework for Iterative Hash Functions — HAIFA*
Enhancing Salted Password Hashing Technique Using Swapping Elements in an Array Algorithm 1Dr
Dynamic Salt Generation and Placement for Secure Password Storing Sirapat Boonkrong and Chaowalit Somboonpattanakit
Security Analysis of MD5 Algorithm in Password Storage
Cryptographic Hash Functions: Theory and Practice
Evaluation of Some Blockcipher Modes of Operation
A Cryptography Application Using Salt Hash Technique
Secure Password Storage.Pptx
Introduction to the Hash Function As a Personal Data Pseudonymisation Technique
Overview of Web Password Hashing Using Salt Technique
Cryptographic Key Blocks Information Supplement
Security Policy Version 2.0
Password-Based Openssl Encryption Analysis of Key Derivation Protocol
Recommendation for Key-Derivation Methods in Key-Establishment Schemes
Misuse-Resistant Cryptography for JOSE/JWT
Partitioning Oracle Attacks
Lecture 24: the Dictionary Attack and the Rainbow-Table Attack on Password Protected Systems
Enhancing Password Based Key Derivation Techniques Passwordscon 2014 Presented by Stephen Lombardo & Nick Parker Sqlcipher
RSA Security Inc
Lecture 5 Encryption
On the Weaknesses of PBKDF2 ⋆