Zobrazeno 1 - 10
of 99
pro vyhledávání: '"PBKDF2"'
Autor:
Dongcheon Kim, Seog Chung Seo
Publikováno v:
IEEE Access, Vol 12, Pp 96436-96448 (2024)
The increasing sensitivity of personal information has led to the widespread adoption of encryption technology for unstructured files and various applications. However, this presents significant challenges for law enforcement agencies tasked with gat
Externí odkaz:
https://doaj.org/article/3d782571b6b7484682f9a8175e95e0a9
Autor:
Ayse Nurdan Saran
Publikováno v:
Frontiers in Computer Science, Vol 6 (2024)
A password hashing algorithm is a cryptographic method that transforms passwords into a secure and irreversible format. It is used not only for authentication purposes but also for key derivation mechanisms. The primary purpose of password hashing is
Externí odkaz:
https://doaj.org/article/1f09f2d260ff4472bba8529188e0d2d1
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Roman Jasek
Publikováno v:
Communications, Vol 17, Iss 1, Pp 73-80 (2015)
Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers. In the article, we present a
Externí odkaz:
https://doaj.org/article/6969a7cf18aa40e18dbb654a8fb815f8
Autor:
Jasek, Roman
Publikováno v:
Komunikácie - vedecké listy Žilinskej univerzity v Žiline / Communications - Scientific Letters of the University of Žilina. 17(1):73-80
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=1122312
Autor:
Hojin Choi, Seog Chung Seo
Publikováno v:
IEEE Access, Vol 9, Pp 40165-40177 (2021)
Password-Based Key Derivation Function 2 (PBKDF2) is widely used cryptographic algorithm in order to generate secure keys to a password in various occasions. For example, it is used for file encryption and implementation of authentication systems, an
Autor:
Federico Gorla, Andrea Visconti
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 17:775-781
PBKDF2 [1] is a well-known password-based key derivation function. In order to slow attackers down, PBKDF2 introduces CPU-intensive operations based on an iterated pseudorandom function (in our case HMAC-SHA-1). If we are able to speed up a SHA-1 or
Publikováno v:
Electronics; Volume 11; Issue 7; Pages: 1068
The password-based key derivation function Scrypt has been employed for many services and applications due to its protection ability. It has also been employed as a proof-of-work algorithm in blockchain implementations. Although this cryptographic ha
Publikováno v:
Journal of Information Security and Applications. 46:296-306
Passwords are widely used to protect our sensitive information or to gain access to specific resources. They should be changed frequently and be strong enough to prevent well-known attacks. Unfortunately, user-chosen passwords are usually short and l
Publikováno v:
CSR
Most common user authentication methods use some form of password or a combination of passwords. However, encryption schemes are generally not directly compatible with user passwords and thus, Password-Based Key Derivation Functions (PBKDFs) are used