Scrypt

Results: 25



#Item
11The M AKWA Password Hashing Function Specifications v1.1 Thomas Pornin, <> April 22, 2015  Abstract

The M AKWA Password Hashing Function Specifications v1.1 Thomas Pornin, <> April 22, 2015 Abstract

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-04-27 09:52:37
12battcrypt (Blowfish All The Things) Steven Thomas (steve at tobtu dot com) Specification Symbols/functions **

battcrypt (Blowfish All The Things) Steven Thomas (steve at tobtu dot com) Specification Symbols/functions **

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-03 12:34:12
13Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographic

Tortuga Password hashing based on the Turtle algorithm Teath Sch <> Introduction Password hashing algorithms are a staple in any cryptographic

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-03 12:37:38
14Security of Key Derivation Functions Ewerton Rodrigues Andrade  Advisor: Prof. Dr. Marcos Antonio Simplicio Junior ´

Security of Key Derivation Functions Ewerton Rodrigues Andrade Advisor: Prof. Dr. Marcos Antonio Simplicio Junior ´

Add to Reading List

Source URL: lyra2.net

Language: English - Date: 2014-01-07 11:26:38
15TwoCats (and SkinnyCat): A Compute Time and Sequential Memory Hard Password Hashing Scheme Bill Cox

TwoCats (and SkinnyCat): A Compute Time and Sequential Memory Hard Password Hashing Scheme Bill Cox

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-04-03 12:39:48
16The Catena Password-Scrambling Framework Christian Forler∗ Stefan Lucks†

The Catena Password-Scrambling Framework Christian Forler∗ Stefan Lucks†

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-09-29 12:17:24
17STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

Add to Reading List

Source URL: www.daemonology.net

Language: English - Date: 2009-06-11 07:29:01
18scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2015-05-31 02:47:44
    19scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

    scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

    Add to Reading List

    Source URL: www.daemonology.net

    Language: English - Date: 2009-06-11 07:30:54
    20Dogecoin likely needs a wingman to survive The key ingredient to the success of any decentralized public ledger, such as Bitcoin, is incentivizing its transactional network to simultaneously secure the network from attac

    Dogecoin likely needs a wingman to survive The key ingredient to the success of any decentralized public ledger, such as Bitcoin, is incentivizing its transactional network to simultaneously secure the network from attac

    Add to Reading List

    Source URL: www.ofnumbers.com

    Language: English - Date: 2014-05-25 11:05:42