Key derivation function

Results: 69



#Item
51Password / Salt / Crypt / Rainbow table / Key stretching / Key derivation function / Ophcrack / Password policy / Security Accounts Manager / Cryptography / Computer security / Security

An Administrator’s Guide to Internet Password Research∗ Dinei Florˆencio and Cormac Herley Microsoft Research, Redmond, USA Paul C. van Oorschot Carleton University, Ottawa, Canada

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2014-08-31 16:13:05
52Quality / Validation / FIPS 140-2 / Elliptic curve cryptography / Key derivation function / Key / Digital Signature Algorithm / Acceptance testing / Crypt / Cryptography / Key management / Public-key cryptography

The Key Agreement Schemes Validation System (KASVS) Updated: May 22, 2014 Previously Updated: January 23, 2013 Previously Updated: September 1, 2011

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-22 10:26:32
53Hashing / SHA-2 / HMAC / Pseudorandom number generator / Computing / Message authentication codes / Key derivation function / Key management

The Key Agreement Schemes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-23 12:28:29
54Hashing / Pseudorandomness / Key derivation function / Cryptographic hash function / Pseudorandom function family / Key / HMAC / Randomness extractor / Symmetric-key algorithm / Cryptography / Key management / Message authentication codes

NIST SP[removed]Recommendation for Key Derivation Using Pseudorandom Functions (Revised)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 13:56:02
55Encryption / Keychain / Advanced Encryption Standard / Cold boot attack / Key derivation function / Brute-force attack / Dm-crypt / Password / Public-key cryptography / Cryptography / Disk encryption / Cryptographic software

Android Encryption Systems Peter Teufl, Andreas Fitzek, Daniel Hein, Alexander Marsalek, Alexander Oprisnik, Thomas Zefferer Institute for Applied Information Processing and Communications Graz University of Technology I

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2014-05-05 09:27:53
56Key management / Crypt / Hashing / Bcrypt / Salt / Password / Hash function / Key derivation function / MD5 / Cryptography / Search algorithms / Cryptographic software

CRYPT(3) Library functions CRYPT(3)

Add to Reading List

Source URL: openwall.com

Language: English - Date: 2009-09-07 19:42:15
57Hashing / Cryptographic hash function / Key / HMAC / Symmetric-key algorithm / Block cipher / CMAC / Initialization vector / Advanced Encryption Standard / Cryptography / Message authentication codes / Key management

NIST SP 800-56C Second Draft, Recommendation for Key Derivation through Extraction-then-Expansion

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 13:48:23
58Computer security / Mozilla add-ons / Key management / Password / LastPass Password Manager / PBKDF2 / Keychain / Key derivation function / Crypt / Cryptography / Software / Cryptographic software

“Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd. {a.belenko, d.sklyarov} @ elcomsoft . com http://www.elcomsoft.com

Add to Reading List

Source URL: www.elcomsoft.com

Language: English - Date: 2014-01-15 02:15:56
59Cryptographic protocols / Key management / HMAC / Key derivation function / Cryptographic hash function / Transport Layer Security / Key / CMAC / Symmetric-key algorithm / Cryptography / Message authentication codes / Hashing

NIST SP[removed]Revision 1, Recommendation for Existing Application-Specific Key Derivation Functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:44:46
60Hashing / Key / Symmetric-key algorithm / Block cipher / Cipher / HMAC / Cryptographic hash function / Stream cipher / Advanced Encryption Standard / Cryptography / Key management / Message authentication codes

Symmetric Key Management: Key Derivation and Key Wrap ¨

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-03-28 05:53:29
UPDATE