A novel memory-hard password hashing scheme for blockchain-based cyber-physical systems

Y Luo, Z Su, W Zheng, Z Chen, F Wang… - ACM Transactions on …, 2021 - dl.acm.org
There has been an increasing interest of integrating blockchain into cyber-physical systems
(CPS). The design of password hashing schemes (PHSs) is in the core of blockchain …

Overview of the Candidates for the Password Hashing Competition: And Their Resistance Against Garbage-Collector Attacks

C Forler, E List, S Lucks, J Wenzel - … 8-10, 2014, Revised Selected Papers …, 2015 - Springer
In this work we provide an overview of the candidates of the Password Hashing Competition
(PHC) regarding to their functionality, eg, client-independent update and server relief, their …

Optimizing a password hashing function with hardware-accelerated symmetric encryption

R Álvarez, A Andrade, A Zamora - Symmetry, 2018 - mdpi.com
Password-based key derivation functions (PBKDFs) are commonly used to transform user
passwords into keys for symmetric encryption, as well as for user authentication, password …

Password Hashing Algorithms-From Past to Future

TSD Phuc, C Lee - JOURNAL OF PLATFORM TECHNOLOGY, 2015 - dbpia.co.kr
Password is a simple technique users do use to protect and authenticate their private
information. It is employed popularly as an effective way in most computer applications and …

Características y aplicaciones de las funciones resumen criptográficas en la gestión de contraseñas

A Andrade - 2019 - rua.ua.es
Actualmente, la criptografía resulta de vital importancia en la protección de la información,
garantizando la confidencialidad, autenticidad, integridad y disponibilidad. Dentro de esta …

Design and analysis of password-based authentication systems

S Mishra, D Chang, SK Sanadhya - 2017 - repository.iiitd.edu.in
Passwords are the most widely deployed means of human-computer authentication since
the early 1960s. The use of passwords, which are usually low in entropy, is delicate in …

[PDF][PDF] Password Hashing Competition second round candidates–tests report (version 3)

M Broz - 2015 - researchgate.net
The second round of Password Hashing Competition presents some tweaked and some
new versions of submitted algorithms. This report tries to run several specific test cases to …