Password-based cryptography

Results: 89



#Item
1Cryptography / Computing / Scrypt / Key management / PBKDF2 / Key derivation function / CPU cache / Password / Cache / Timing attack / Lookup table

Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
2Computer access control / Computing / Cryptography / Computer security / YubiKey / HMAC-based One-time Password Algorithm / Universal 2nd Factor / Time-based One-time Password Algorithm / One-time password / Dropbox / CCID / LastPass

YubiKey 4 and YubiKey 4 Nano • YubiKey 4 and YubiKey 4 Nano offers strong authentication via Yubico one-time passwords (OTP), FIDO Universal 2nd Factor (U2F), and smart card (PIV, OpenPGP, OATH-TOTP, and OATH-HOTP) --

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-02-04 14:54:44
3Computer access control / Computer security / Cryptography / Computing / YubiKey / Pluggable authentication module / One-time password / Hash-based message authentication code / Authentication / LinOTP / HMAC-based One-time Password Algorithm

YubiKey Mac OS X Login Using Yubico Pluggable Authentication Module (PAM) with Challenge-Response YubiKey Mac OS X Login

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-04-12 12:42:03
4Computer access control / Cryptography / Computer security / Computing / YubiKey / HMAC-based One-time Password Algorithm / Universal 2nd Factor / LastPass / Time-based One-time Password Algorithm / One-time password / Password manager / CCID

YubiKey Standard and YubiKey Nano • YubiKey Standard and YubiKey Nano offer strong authentication via Yubico one-time passwords (OTP) with a simple tap or touch of a button • Works instantly with no need to re-type p

Add to Reading List

Source URL: www.yubico.com

Language: English
5Cryptography / Cryptographic hash functions / NIST hash function competition / SHA-3 / Sponge function / Password / Crypt / Hash function / Exclusive or / Key derivation function / Lyra2

Gambit A sponge based, memory hard key derivation function Krisztián Pintér ()  Pseudocode S

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-14 07:18:05
6Cryptography / Key management / Cryptographic hash functions / Feistel cipher / Key stretching / Block cipher / Crypt / Scrypt / Password / Key derivation function / Data Encryption Standard / Key

Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographic

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-03 12:37:38
7Computer access control / Cryptography / Computing / Computer security / YubiKey / Universal 2nd Factor / HMAC-based One-time Password Algorithm / Time-based One-time Password Algorithm / One-time password / CCID / Dropbox / LastPass

YubiKey NEO-n • YubiKey NEO-n offers strong authentication via Yubico one-time passwords (OTP), FIDO Universal 2nd Factor (U2F), and smart card (PIV) -- all with a simple tap or touch of a button • Works instantly wi

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-02-04 14:54:42
8Cryptography / Prevention / Computer access control / Security / Access control / Authentication / Notary / Packaging / Password / Questionnaire / Job interview / Cognitive password

Where Have You Been? Using Location-Based Security Questions for Fallback Authentication Alina Hang Media Informatics Group University of Munich (LMU)

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:55
9Computing / Cryptography / Computer security / Computer network security / Cyberwarfare / Password / Denial-of-service attack / Firewall / SOAP / Authentication / Public-key cryptography / Internet security

Evidence-Based Access Control for Ubiquitous Web Services Nishith Khantal IIT, Kanpur

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:03
10Learning with errors / RSA / Ideal lattice cryptography / Index of cryptography articles / Cryptography / Cryptographic protocols / Password-authenticated key agreement

Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1 University of Maryland

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2009-09-07 10:57:44
UPDATE