<--- Back to Details
First PageDocument Content
Computing / Computer architecture / Cryptography / Central processing unit / Parallel computing / Instruction set architectures / Scrypt / Salsa20 / SIMD / ARM architecture / X86 / SHA-2
Date: 2015-10-25 04:56:20
Computing
Computer architecture
Cryptography
Central processing unit
Parallel computing
Instruction set architectures
Scrypt
Salsa20
SIMD
ARM architecture
X86
SHA-2

yescrypt - a Password Hashing Competition submission Name of the submitted scheme: Name and email address of the submitter(s): Originally submitted on: This revision:

Add to Reading List

Source URL: password-hashing.net

Download Document from Source Website

File Size: 134,87 KB

Share Document on Facebook

Similar Documents

Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de

Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de

DocID: 1rfah - View Document

Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au

Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au

DocID: 1r3RN - View Document

Microsoft Word - Vert_Website Paper by r0ach.rtf

Microsoft Word - Vert_Website Paper by r0ach.rtf

DocID: 1pzqd - View Document

Cache Attack Against scrypt Advisor(s): Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Cache Attack Against scrypt Advisor(s): Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

DocID: 1p7g0 - View Document

yescrypt - a Password Hashing Competition submission  Name of the submitted scheme: Name and email address of the submitter(s): Originally submitted on: This revision:

yescrypt - a Password Hashing Competition submission Name of the submitted scheme: Name and email address of the submitter(s): Originally submitted on: This revision:

DocID: 1okRv - View Document