Back to Results
First PageMeta Content
Information retrieval / Artificial intelligence / Cryptographic hash functions / Error detection and correction / Hash function / Hash table / Key derivation function / Tabulation hashing / Rainbow table / Search algorithms / Cryptography / Hashing


scrypt.dvi
Add to Reading List

Document Date: 2011-10-27 15:49:52


Open Document

File Size: 201,84 KB

Share Result on Facebook

City

Introduction Password / Durham / /

Company

RSA Laboratories / Bernstein / /

Currency

pence / /

/

IndustryTerm

semiconductor technology / attacks using custom hardware / above algorithms / bank accounts / performance computing / parallel hardware / software implementation / brute-force search / software implementations / peripheral devices / memory-hard algorithms / sequential algorithm / derivation algorithm / parallel algorithm / ever-increasing computing power / memory-hard algorithm / derivation algorithms / semiconductor technology advances / /

OperatingSystem

UNIX / Windows 95 / /

Person

COLIN PERCIVAL / /

Product

Salsa20 / /

ProgrammingLanguage

C / /

ProvinceOrState

Manitoba / /

Technology

semiconductor / existing key derivation algorithms / above algorithms / This algorithm / sequential algorithm / RAM / UNIX / semiconductor technology / memory-hard algorithm / block cipher / parallel algorithm / paging / Random Access / operating system / HEKS key derivation algorithm / memory-hard algorithms / little-endian / two algorithms / /

SocialTag