Cryptanalytic time–memory trade-off for password hashing schemes
暂无分享,去创建一个
[1] Philippe Oechslin,et al. Making a Faster Cryptanalytic Time-Memory Trade-Off , 2003, CRYPTO.
[2] J. Tukey,et al. An algorithm for the machine calculation of complex Fourier series , 1965 .
[3] Jerome H. Saltzer,et al. Protection and the control of information sharing in multics , 1974, CACM.
[4] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[5] Dan Boneh,et al. Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns , 2016, IACR Cryptol. ePrint Arch..
[6] Stefan Lucks,et al. The Catena Password-Scrambling Framework , 2015 .
[7] Martin E. Hellman,et al. A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.
[8] Jean-Philippe Aumasson,et al. BLAKE 2 : simpler , smaller , fast as MD 5 , 2012 .
[9] Robert E. Tarjan,et al. Upper and lower bounds on time-space tradeoffs , 1979, STOC '79.
[10] Donghoon Chang,et al. Rig: A simple, secure and flexible design for Password Hashing , 2015, IACR Cryptol. ePrint Arch..
[11] Alex Biryukov,et al. The memory-hard Argon2 password hash and proof-of-work function , 2020 .
[12] William F. Bradley,et al. Superconcentration on a Pair of Butterflies , 2014, ArXiv.
[13] Alex Biryukov,et al. Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[14] Samuel Neves,et al. BLAKE2: Simpler, Smaller, Fast as MD5 , 2013, ACNS.
[15] Alex Biryukov,et al. Tradeoff Cryptanalysis of Memory-Hard Functions , 2015, ASIACRYPT.
[16] Alex Biryukov,et al. Argon 2 : the memory-hard function for password hashing and other applications , 2015 .
[17] Colin Percival. STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS , 2009 .
[18] Stefan Lucks,et al. Catena: A Memory-Consuming Password Scrambler , 2013, IACR Cryptol. ePrint Arch..
[19] Jerome H. Saltzer,et al. Protection and control of information sharing in multics , 1973, SOSP '73.