First Page | Document Content | |
---|---|---|
Date: 2017-12-30 21:51:59Cryptography Computer security Computer access control Password Crypt Salt Rainbow table Usability Bcrypt Brute-force attack Key derivation function Password policy | Why Do Developers Get Password Storage Wrong? A Qualitative Usability StudyAdd to Reading ListSource URL: acmccs.github.ioDownload Document from Source WebsiteFile Size: 2,36 MBShare Document on Facebook |
Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.deDocID: 1rfah - View Document | |
Ω Omega Crypt (ocrypt) Brandon Enright http://www.brandonenright.net/ocrypt/DocID: 1o00I - View Document | |
Developing with Catalyst as securely as possible What do I need to do? ● Catalyst generally tries to help you be secure and most of the plugins are prettyDocID: 1nN81 - View Document | |
The M AKWA Password Hashing Function Specifications v1.1 Thomas Pornin, <> April 22, 2015 AbstractDocID: 1nsFe - View Document | |
battcrypt (Blowfish All The Things) Steven Thomas (steve at tobtu dot com) Specification Symbols/functions **DocID: 1nqRi - View Document |