[图书][B] Understanding cryptography
This is the second edition of Understanding Cryptography. Ever since we released the first
edition in 2009, we have been humbled by the many positive responses we received from …
edition in 2009, we have been humbled by the many positive responses we received from …
MEGA: malleable encryption goes awry
M Backendal, M Haller… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
MEGA is a leading cloud storage platform with more than 250 million users and 1000
Petabytes of stored data. MEGA claims to offer user-controlled, end-to-end security. This is …
Petabytes of stored data. MEGA claims to offer user-controlled, end-to-end security. This is …
[PDF][PDF] Providing password security by salted password hashing using bcrypt algorithm
P Sriramya, RA Karthika - ARPN journal of engineering and applied …, 2015 - academia.edu
ABSTRACT World Wide Web has become a popular medium to search information,
business, trading and so on. Various organizations and companies are also employing the …
business, trading and so on. Various organizations and companies are also employing the …
On time-memory trade-offs for password hashing schemes
AN Saran - Frontiers in Computer Science, 2024 - frontiersin.org
A password hashing algorithm is a cryptographic method that transforms passwords into a
secure and irreversible format. It is used not only for authentication purposes but also for key …
secure and irreversible format. It is used not only for authentication purposes but also for key …
On the weaknesses of PBKDF2
Password-based key derivation functions are of particular interest in cryptography because
they (a) input a password/passphrase (which usually is short and lacks enough entropy) and …
they (a) input a password/passphrase (which usually is short and lacks enough entropy) and …
Password-hashing status
G Hatzivasilis - Cryptography, 2017 - mdpi.com
Computers are used in our everyday activities, with high volumes of users accessing
provided services. One-factor authentication consisting of a username and a password is the …
provided services. One-factor authentication consisting of a username and a password is the …
High-speed implementation of bcrypt password search using special-purpose hardware
F Wiemer, R Zimmermann - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
Using passwords for user authentication is still the most common method for many internet
services and attacks on the password databases pose a severe threat. To reduce this risk …
services and attacks on the password databases pose a severe threat. To reduce this risk …
Lyra2: Efficient password hashing with high security against time-memory trade-offs
ER Andrade, MA Simplicio… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
We present Lyra2, a password hashing scheme (PHS) based on cryptographic sponges.
Lyra2 was designed to be strictly sequential for a given number of cores (ie, not easily …
Lyra2 was designed to be strictly sequential for a given number of cores (ie, not easily …
On password guessing with GPUs and FPGAs
Passwords are still by far the most widely used form of user authentication, for applications
ranging from online banking or corporate network access to storage encryption. Password …
ranging from online banking or corporate network access to storage encryption. Password …
What users should know about full disk encryption based on LUKS
S Bossi, A Visconti - Cryptology and Network Security: 14th International …, 2015 - Springer
Mobile devices, laptops, and USB memory usually store large amounts of sensitive
information frequently unprotected. Unauthorized access to or release of such information …
information frequently unprotected. Unauthorized access to or release of such information …