搜索结果: 1-11 共查到“password hashing”相关记录11条 . 查询时间(0.075 秒)
Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes
Time-Memory tradeoff password hashing
2017/6/26
A cryptanalytic technique known as time-memory tradeoff (TMTO) was proposed by Hellman for finding the secret key of a block cipher. This technique allows sharing the effort of key search between the ...
On the Memory-Hardness of Data-Independent Password-Hashing Functions
password hashing memory hardness
2016/12/10
We show attacks on five data-independent memory-hard functions (iMHF) that were submitted to the password hashing competition. Informally, an MHF is a function which cannot be evaluated on dedicated h...
Open Sesame: The Password Hashing Competition and Argon2
Password Hashing Competition Argon2 Memory-Hard Hash Functions
2016/2/23
In this document we present an overview of the background to and
goals of the Password Hashing Competition (PHC) as well as the design of its
winner, Argon2, and its security requirements and proper...
M3dcrypt is a password hashing function built around the Advanced
Encryption Standard (AES) algorithm and the arcfour pseudorandom
function. It uses up to 256-bit pseudorandom salt values and suppor...
Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms
password hashing login
2016/1/7
Password-based authentication has been widely deployed in practice due to its simplicity and efficiency. Storing passwords and deriving cryptographic keys from passwords in a secure manner are crucial...
Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks
Password Hashing Competition Overview Garbage-Collector Attacks
2016/1/6
In this work we provide an overview of the candidates of
the Password Hashing Competition (PHC) regarding to their functionality,
e.g., client-independent update and server relief, their security, e...
Rig: A simple, secure and flexible design for Password Hashing
Password Password hashing GPU attack
2016/1/5
Password Hashing, a technique commonly implemented
by a server to protect passwords of clients, by performing a one-way
transformation on the password, turning it into another string called the
has...
Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs
Password hashing processing time memory usage
2016/1/4
We present Lyra2, a password hashing scheme (PHS) based
on cryptographic sponges. Lyra2 was designed to be strictly sequential
(i.e., not easily parallelizable), providing strong security even again...
In this work we have analyzed some password hashing schemes for performance under
various settings of time and memory complexities. We have attempted to benchmark the
said algorithms at similar leve...
Password hashing is the common approach for maintaining
users’ password-related information that is later used for authentication.
A hash for each password is calculated and maintained at the servic...
Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing
memory-hard cryptocurrency bitcoin tradeoff
2015/12/30
Memory-hard functions are becoming an important tool in the design of password hashing schemes, cryptocurrencies,
and more generic proof-of-work primitives that are x86-oriented and can not be comput...