<--- Back to Details
First PageDocument Content
Cryptography / Computing / Scrypt / Key management / PBKDF2 / Key derivation function / CPU cache / Password / Cache / Timing attack / Lookup table
Date: 2015-09-08 06:00:03
Cryptography
Computing
Scrypt
Key management
PBKDF2
Key derivation function
CPU cache
Password
Cache
Timing attack
Lookup table

Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au

Add to Reading List

Source URL: www.iaik.tugraz.at

Download Document from Source Website

File Size: 70,21 KB

Share Document on Facebook

Similar Documents

Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de

Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de

DocID: 1rfah - View Document

Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au

Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au

DocID: 1r3RN - View Document

Microsoft Word - Vert_Website Paper by r0ach.rtf

Microsoft Word - Vert_Website Paper by r0ach.rtf

DocID: 1pzqd - View Document

Cache Attack Against scrypt Advisor(s): Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Cache Attack Against scrypt Advisor(s): Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

DocID: 1p7g0 - View Document

yescrypt - a Password Hashing Competition submission  Name of the submitted scheme: Name and email address of the submitter(s): Originally submitted on: This revision:

yescrypt - a Password Hashing Competition submission Name of the submitted scheme: Name and email address of the submitter(s): Originally submitted on: This revision:

DocID: 1okRv - View Document