Optimizing a password hashing function with hardware-accelerated symmetric encryption
From MaRDI portal
Publication:2337862
DOI10.3390/SYM10120705zbMATH Open1425.68100OpenAlexW2902633267WikidataQ114577360 ScholiaQ114577360MaRDI QIDQ2337862FDOQ2337862
Alicia Andrade, Antonio Zamora, Rafael Álvarez
Publication date: 20 November 2019
Published in: Symmetry (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.3390/sym10120705
Recommendations
- Rig: a simple, secure and flexible design for password hashing
- Topics in Cryptology – CT-RSA 2005
- Design and Analysis of Password-Based Key Derivation Functions
- VLSI design and implementation of combined secure hash algorithm SHA-512
- Constructing chaos-based hash function via parallel impulse perturbation
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Title not available (Why is that?)
- On the Indifferentiability of the Sponge Construction
- A cryptanalytic time-memory trade-off
- Two-round password-only authenticated key exchange in the three-party setting
- Memory-Demanding Password Scrambling
- Lyra2: Efficient Password Hashing with High Security against Time-Memory Trade-Offs
- Lattice-based revocable certificateless signature
- Improved asymmetric cipher based on matrix power function with provable security
- Simple authenticated key agreement and protected password change protocol
Cited In (1)
This page was built for publication: Optimizing a password hashing function with hardware-accelerated symmetric encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2337862)