1![Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de](https://www.pdfsearch.io/img/21b2d53a09adfff734b1fdda01b679b5.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2014-12-17 04:25:27
|
---|
2![Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au](https://www.pdfsearch.io/img/55f22e074b2dac04b27df7dde828f000.jpg) | Add to Reading ListSource URL: www.iaik.tugraz.atLanguage: English - Date: 2015-09-08 06:00:03
|
---|
3![Passpet: Convenient Password Management and Phishing Protection Ka-Ping Yee University of California, Berkeley Passpet: Convenient Password Management and Phishing Protection Ka-Ping Yee University of California, Berkeley](https://www.pdfsearch.io/img/a4863e3abdbea67f4fde599c1ec57a29.jpg) | Add to Reading ListSource URL: cups.cs.cmu.eduLanguage: English - Date: 2006-05-30 18:17:59
|
---|
4![Mercury: Recovering Forgotten Passwords Using Personal Devices⋆ Mohammad Mannan1 , David Barrera2, Carson Brown2, David Lie1 , and Paul C. van Oorschot2 1 Mercury: Recovering Forgotten Passwords Using Personal Devices⋆ Mohammad Mannan1 , David Barrera2, Carson Brown2, David Lie1 , and Paul C. van Oorschot2 1](https://www.pdfsearch.io/img/671a07d3e2d1cd97440016b80ad2b79f.jpg) | Add to Reading ListSource URL: www.eecg.toronto.eduLanguage: English - Date: 2010-12-21 12:01:07
|
---|
5![Improving the Password Selection Mechanism Richard M. Conlan Peter Tarasewich Northeastern University CC&IS Improving the Password Selection Mechanism Richard M. Conlan Peter Tarasewich Northeastern University CC&IS](https://www.pdfsearch.io/img/0a5e6d381cd53952af5cf11415f12806.jpg) | Add to Reading ListSource URL: cups.cs.cmu.eduLanguage: English - Date: 2006-06-02 14:44:50
|
---|
6![Cache Attack Against scrypt Advisor(s): Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation Cache Attack Against scrypt Advisor(s): Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation](https://www.pdfsearch.io/img/4fecbc18db61bf02a459872b8733500c.jpg) | Add to Reading ListSource URL: www.iaik.tugraz.atLanguage: English - Date: 2015-11-30 11:00:03
|
---|
7![Argon2 Designers: Alex Biryukov, Daniel Dinu, and Dmitry Khovratovich University of Luxembourg, Luxembourg , , https://www.cryptolux.org/index.php/Argo Argon2 Designers: Alex Biryukov, Daniel Dinu, and Dmitry Khovratovich University of Luxembourg, Luxembourg , , https://www.cryptolux.org/index.php/Argo](https://www.pdfsearch.io/img/1ae75e1e472e1f4d3cd1f15291759632.jpg) | Add to Reading ListSource URL: password-hashing.netLanguage: English - Date: 2015-07-22 02:06:59
|
---|
8![Ω Omega Crypt (ocrypt) Brandon Enright http://www.brandonenright.net/ocrypt/ Ω Omega Crypt (ocrypt) Brandon Enright http://www.brandonenright.net/ocrypt/](https://www.pdfsearch.io/img/f8ac9bcc7da0f4a2b84f66428c175917.jpg) | Add to Reading ListSource URL: password-hashing.netLanguage: English |
---|
9![Gambit A sponge based, memory hard key derivation function Krisztián Pintér () Pseudocode S Gambit A sponge based, memory hard key derivation function Krisztián Pintér () Pseudocode S](https://www.pdfsearch.io/img/b6902d234ff807c48ba7ceb616be2061.jpg) | Add to Reading ListSource URL: password-hashing.netLanguage: English - Date: 2014-04-14 07:18:05
|
---|
10![Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet](https://www.pdfsearch.io/img/018b28c68177a273854edf3fa0fcc394.jpg) | Add to Reading ListSource URL: password-hashing.netLanguage: English |
---|