<--- Back to Details
First PageDocument Content
Cryptography / Cryptographic hash functions / Key management / Pseudorandomness / Search algorithms / PBKDF2 / Password / Scrypt / Crypt / Key derivation function / Pseudorandom function family / Salt
Cryptography
Cryptographic hash functions
Key management
Pseudorandomness
Search algorithms
PBKDF2
Password
Scrypt
Crypt
Key derivation function
Pseudorandom function family
Salt

Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

Add to Reading List

Source URL: password-hashing.net

Download Document from Source Website

File Size: 394,67 KB

Share Document on Facebook

Similar Documents

Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de

Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de

DocID: 1rfah - View Document

Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au

Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au

DocID: 1r3RN - View Document

Passpet: Convenient Password Management and Phishing Protection Ka-Ping Yee University of California, Berkeley

Passpet: Convenient Password Management and Phishing Protection Ka-Ping Yee University of California, Berkeley

DocID: 1r2oC - View Document

Mercury: Recovering Forgotten Passwords Using Personal Devices⋆ Mohammad Mannan1 , David Barrera2, Carson Brown2, David Lie1 , and Paul C. van Oorschot2 1

Mercury: Recovering Forgotten Passwords Using Personal Devices⋆ Mohammad Mannan1 , David Barrera2, Carson Brown2, David Lie1 , and Paul C. van Oorschot2 1

DocID: 1qoqY - View Document

Improving the Password Selection Mechanism Richard M. Conlan Peter Tarasewich  Northeastern University CC&IS

Improving the Password Selection Mechanism Richard M. Conlan Peter Tarasewich Northeastern University CC&IS

DocID: 1ppQz - View Document