[图书][B] Understanding cryptography

C Paar, J Pelzl - 2010 - Springer
This is the second edition of Understanding Cryptography. Ever since we released the first
edition in 2009, we have been humbled by the many positive responses we received from …

MEGA: malleable encryption goes awry

M Backendal, M Haller… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
MEGA is a leading cloud storage platform with more than 250 million users and 1000
Petabytes of stored data. MEGA claims to offer user-controlled, end-to-end security. This is …

[PDF][PDF] Providing password security by salted password hashing using bcrypt algorithm

P Sriramya, RA Karthika - ARPN journal of engineering and applied …, 2015 - academia.edu
ABSTRACT World Wide Web has become a popular medium to search information,
business, trading and so on. Various organizations and companies are also employing the …

On time-memory trade-offs for password hashing schemes

AN Saran - Frontiers in Computer Science, 2024 - frontiersin.org
A password hashing algorithm is a cryptographic method that transforms passwords into a
secure and irreversible format. It is used not only for authentication purposes but also for key …

On the weaknesses of PBKDF2

A Visconti, S Bossi, H Ragab, A Calò - Cryptology and Network Security …, 2015 - Springer
Password-based key derivation functions are of particular interest in cryptography because
they (a) input a password/passphrase (which usually is short and lacks enough entropy) and …

Password-hashing status

G Hatzivasilis - Cryptography, 2017 - mdpi.com
Computers are used in our everyday activities, with high volumes of users accessing
provided services. One-factor authentication consisting of a username and a password is the …

High-speed implementation of bcrypt password search using special-purpose hardware

F Wiemer, R Zimmermann - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
Using passwords for user authentication is still the most common method for many internet
services and attacks on the password databases pose a severe threat. To reduce this risk …

Lyra2: Efficient password hashing with high security against time-memory trade-offs

ER Andrade, MA Simplicio… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
We present Lyra2, a password hashing scheme (PHS) based on cryptographic sponges.
Lyra2 was designed to be strictly sequential for a given number of cores (ie, not easily …

On password guessing with GPUs and FPGAs

M Dürmuth, T Kranz - Technology and Practice of Passwords: International …, 2015 - Springer
Passwords are still by far the most widely used form of user authentication, for applications
ranging from online banking or corporate network access to storage encryption. Password …

What users should know about full disk encryption based on LUKS

S Bossi, A Visconti - Cryptology and Network Security: 14th International …, 2015 - Springer
Mobile devices, laptops, and USB memory usually store large amounts of sensitive
information frequently unprotected. Unauthorized access to or release of such information …