An In-Depth Analysis of Password Managers and Two-Factor Authentication Tools

M Jubur, PP Shrestha, N Saxena - ACM Computing Surveys, 2025 - dl.acm.org
Passwords remain the primary authentication method in online services, a domain
increasingly crucial in our digital age. However, passwords suffer from several well …

Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext

N Tihanyi, T Bisztray, B Borsos… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Using the computational resources of an untrusted third party to crack a password hash can
pose a high number of privacy and security risks. The act of revealing the hash digest could …