Back to Results
First PageMeta Content
Cryptographic hash functions / Mathematics / Information retrieval / Error detection and correction / Hash function / Hash table / Key derivation function / Tabulation hashing / Rainbow table / Search algorithms / Cryptography / Hashing


STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f
Add to Reading List

Document Date: 2013-12-11 18:35:17


Open Document

File Size: 201,84 KB

Share Result on Facebook

City

Introduction Password / Durham / /

Company

RSA Laboratories / Bernstein / /

Currency

pence / /

/

IndustryTerm

semiconductor technology / attacks using custom hardware / above algorithms / bank accounts / performance computing / parallel hardware / software implementation / brute-force search / software implementations / peripheral devices / memory-hard algorithms / sequential algorithm / derivation algorithm / parallel algorithm / ever-increasing computing power / memory-hard algorithm / derivation algorithms / semiconductor technology advances / /

OperatingSystem

UNIX / Windows 95 / /

Person

COLIN PERCIVAL / /

Product

Salsa20 / /

ProgrammingLanguage

C / /

ProvinceOrState

Manitoba / /

Technology

semiconductor / existing key derivation algorithms / above algorithms / This algorithm / sequential algorithm / RAM / UNIX / semiconductor technology / memory-hard algorithm / block cipher / parallel algorithm / paging / Random Access / operating system / HEKS key derivation algorithm / memory-hard algorithms / little-endian / two algorithms / /

SocialTag