A novel memory-hard password hashing scheme for blockchain-based cyber-physical systems
Y Luo, Z Su, W Zheng, Z Chen, F Wang… - ACM Transactions on …, 2021 - dl.acm.org
There has been an increasing interest of integrating blockchain into cyber-physical systems
(CPS). The design of password hashing schemes (PHSs) is in the core of blockchain …
(CPS). The design of password hashing schemes (PHSs) is in the core of blockchain …
Overview of the Candidates for the Password Hashing Competition: And Their Resistance Against Garbage-Collector Attacks
In this work we provide an overview of the candidates of the Password Hashing Competition
(PHC) regarding to their functionality, eg, client-independent update and server relief, their …
(PHC) regarding to their functionality, eg, client-independent update and server relief, their …
Optimizing a password hashing function with hardware-accelerated symmetric encryption
Password-based key derivation functions (PBKDFs) are commonly used to transform user
passwords into keys for symmetric encryption, as well as for user authentication, password …
passwords into keys for symmetric encryption, as well as for user authentication, password …
Password Hashing Algorithms-From Past to Future
Password is a simple technique users do use to protect and authenticate their private
information. It is employed popularly as an effective way in most computer applications and …
information. It is employed popularly as an effective way in most computer applications and …
Características y aplicaciones de las funciones resumen criptográficas en la gestión de contraseñas
A Andrade - 2019 - rua.ua.es
Actualmente, la criptografía resulta de vital importancia en la protección de la información,
garantizando la confidencialidad, autenticidad, integridad y disponibilidad. Dentro de esta …
garantizando la confidencialidad, autenticidad, integridad y disponibilidad. Dentro de esta …
Design and analysis of password-based authentication systems
Passwords are the most widely deployed means of human-computer authentication since
the early 1960s. The use of passwords, which are usually low in entropy, is delicate in …
the early 1960s. The use of passwords, which are usually low in entropy, is delicate in …
[PDF][PDF] Password Hashing Competition second round candidates–tests report (version 3)
M Broz - 2015 - researchgate.net
The second round of Password Hashing Competition presents some tweaked and some
new versions of submitted algorithms. This report tries to run several specific test cases to …
new versions of submitted algorithms. This report tries to run several specific test cases to …