Password Hashing Competition

Results: 8



#Item
1Computing / Computer architecture / Cryptography / Central processing unit / Parallel computing / Instruction set architectures / Scrypt / Salsa20 / SIMD / ARM architecture / X86 / SHA-2

yescrypt - a Password Hashing Competition submission Name of the submitted scheme: Name and email address of the submitter(s): Originally submitted on: This revision:

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-10-25 04:56:20
2Cryptography / Argon2 / Lyra2 / BLAKE / Password Hashing Competition / Key derivation function / Hash function / Cryptographic hash function / Cryptographic nonce / Password / Salt / Scrypt

Argon2 Designers: Alex Biryukov, Daniel Dinu, and Dmitry Khovratovich University of Luxembourg, Luxembourg , , https://www.cryptolux.org/index.php/Argo

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-07-22 02:06:59
3

Password Hashing Competition JP Aumasson, Kudelski Security This talk •

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2016-01-15 16:40:42
    4Cryptography / Cryptographic hash functions / NIST hash function competition / SHA-3 / Sponge function / Password / Crypt / Hash function / Exclusive or / Key derivation function / Lyra2

    Gambit A sponge based, memory hard key derivation function Krisztián Pintér ()  Pseudocode S

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2014-04-14 07:18:05
    5Mathematics / Elementary mathematics / Music / Functions and mappings / Search algorithms / Calques / Earworm / Music psychology / Advanced Encryption Standard / Derivative / Variable / Hash function

    The earworm Password Hashing Algorithm Password Hashing Competition Submission Document (Round 1) Daniel Franke <> March 31, 2014

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2014-04-03 12:32:13
    6Cryptographic software / Computer law / Password cracking / Password / Rainbow table / Salt / Key stretching / Crypt / Bcrypt / Cryptography / Cryptographic hash functions / Key management

    Password Hashing Competition - Survey and Benchmark George Hatzivasilis1 , Ioannis Papaefstathiou1 , and Charalampos Manifavas2 1 2

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-03-22 05:43:55
    7Hashing / Search algorithms / Keccak / SHA-2 / Hash function / SHA-1 / Password / Salt / NIST hash function competition / Cryptography / Cryptographic hash functions / Error detection and correction

    Pleco and Plectron – Two Provably Secure Password Hashing Algorithms Bo Zhu, Xinxin Fan, and Guang Gong Department of Electrical and Computer Engineering, University of Waterloo, Canada {bo.zhu,x5fan,ggong}@uwaterloo.

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-09-12 12:07:46
    UPDATE