<--- Back to Details
First PageDocument Content
Password / PBKDF2 / Brute-force attack / Bcrypt / Crypt / Key stretching / Rainbow table / Cryptography / Key management / Key derivation function
Date: 2011-10-27 15:49:52
Password
PBKDF2
Brute-force attack
Bcrypt
Crypt
Key stretching
Rainbow table
Cryptography
Key management
Key derivation function

scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

Add to Reading List

Source URL: www.tarsnap.com

Download Document from Source Website

File Size: 555,87 KB

Share Document on Facebook

Similar Documents

Voting with Their Feet: Inferring User Preferences from App Management Activities Huoran Li1 , Wei Ai2 , ‡ Xuanzhe Liu1 , Jian Tang3 , ‡ Gang Huang1 , Feng Feng4 , ‡ Qiaozhu Mei2 1  Key Lab of High-Confidence Softw

Voting with Their Feet: Inferring User Preferences from App Management Activities Huoran Li1 , Wei Ai2 , ‡ Xuanzhe Liu1 , Jian Tang3 , ‡ Gang Huang1 , Feng Feng4 , ‡ Qiaozhu Mei2 1 Key Lab of High-Confidence Softw

DocID: 1xVAe - View Document

Formal Analysis of Key Management APIs Graham Steel INRIA & LSV, ENS de Cachan 1/48

Formal Analysis of Key Management APIs Graham Steel INRIA & LSV, ENS de Cachan 1/48

DocID: 1xVmr - View Document

NuCypher: A proxy re-encryption network to empower privacy in decentralized systems Michael Egorov,∗ David Nuñez,† and MacLane Wilkison‡ NuCypher (Dated: June 19, 2018) NuCypher is a decentralized Key Management S

NuCypher: A proxy re-encryption network to empower privacy in decentralized systems Michael Egorov,∗ David Nuñez,† and MacLane Wilkison‡ NuCypher (Dated: June 19, 2018) NuCypher is a decentralized Key Management S

DocID: 1xUUF - View Document

SOLUTIONS FOR THE PUBLIC SECTOR KEY BUILDING BLOCKS FOR BUILDING A DIGITAL GOVERNMENT SERVICE & PROJECT MANAGEMENT Together on one platform.

SOLUTIONS FOR THE PUBLIC SECTOR KEY BUILDING BLOCKS FOR BUILDING A DIGITAL GOVERNMENT SERVICE & PROJECT MANAGEMENT Together on one platform.

DocID: 1xTo0 - View Document

Data Sheet  Comodo Mobile Device Management Secure and centrally manage large-scale deployments of corporate and personal mobile devices Key Benefits

Data Sheet Comodo Mobile Device Management Secure and centrally manage large-scale deployments of corporate and personal mobile devices Key Benefits

DocID: 1xTcs - View Document