搜索结果: 1-11 共查到“Password hashing”相关记录11条 . 查询时间(0.056 秒)
Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes
Time-Memory tradeoff password hashing
font style='font-size:12px;'>
2017/6/26
A cryptanalytic technique known as time-memory tradeoff (TMTO) was proposed by Hellman for finding the secret key of a block cipher. This technique allows sharing the effort of key search between the ...
On the Memory-Hardness of Data-Independent Password-Hashing Functions
password hashing memory hardness
font style='font-size:12px;'>
2016/12/10
We show attacks on five data-independent memory-hard functions (iMHF) that were submitted to the password hashing competition. Informally, an MHF is a function which cannot be evaluated on dedicated h...
Open Sesame: The Password Hashing Competition and Argon2
Password Hashing Competition Argon2 Memory-Hard Hash Functions
font style='font-size:12px;'>
2016/2/23
In this document we present an overview of the background to and
goals of the Password Hashing Competition (PHC) as well as the design of its
winner, Argon2, and its security requirements and proper...
The M3dcrypt Password Hashing Function
one-way functions psedorandom functions
font style='font-size:12px;'>
2016/1/8
M3dcrypt is a password hashing function built around the Advanced
Encryption Standard (AES) algorithm and the arcfour pseudorandom
function. It uses up to 256-bit pseudorandom salt values and suppor...
Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms
password hashing login
font style='font-size:12px;'>
2016/1/7
Password-based authentication has been widely deployed in practice due to its simplicity and efficiency. Storing passwords and deriving cryptographic keys from passwords in a secure manner are crucial...
Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks
Password Hashing Competition Overview Garbage-Collector Attacks
font style='font-size:12px;'>
2016/1/6
In this work we provide an overview of the candidates of
the Password Hashing Competition (PHC) regarding to their functionality,
e.g., client-independent update and server relief, their security, e...
Rig: A simple, secure and flexible design for Password Hashing
Password Password hashing GPU attack
font style='font-size:12px;'>
2016/1/5
Password Hashing, a technique commonly implemented
by a server to protect passwords of clients, by performing a one-way
transformation on the password, turning it into another string called the
has...
Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs
Password hashing processing time memory usage
font style='font-size:12px;'>
2016/1/4
We present Lyra2, a password hashing scheme (PHS) based
on cryptographic sponges. Lyra2 was designed to be strictly sequential
(i.e., not easily parallelizable), providing strong security even again...
Performance Analysis of Some Password Hashing Schemes
Password hashing benchmark PHC
font style='font-size:12px;'>
2016/1/4
In this work we have analyzed some password hashing schemes for performance under
various settings of time and memory complexities. We have attempted to benchmark the
said algorithms at similar leve...
Password Hashing Competition - Survey and Benchmark
PHC password hashing key deviation
font style='font-size:12px;'>
2016/1/3
Password hashing is the common approach for maintaining
users’ password-related information that is later used for authentication.
A hash for each password is calculated and maintained at the servic...
Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing
memory-hard cryptocurrency bitcoin tradeoff
font style='font-size:12px;'>
2015/12/30
Memory-hard functions are becoming an important tool in the design of password hashing schemes, cryptocurrencies,
and more generic proof-of-work primitives that are x86-oriented and can not be comput...