Results 1 to 10 of about 1,020 (118)
Key Derivation: A Dynamic PBKDF2 Model for Modern Cryptographic Systems [PDF]
Traditional key derivation techniques, including the widely adopted PBKDF2, operate with static parameters that do not account for contextual factors such as device capabilities, data sensitivity, or password strength.
Ali Abdullah S Alqahtani
exaly +5 more sources
Efficient Optimization of MS Office 2013+ Password Cracking and PBKDF2-HMAC-SHA2 on GPUs
The increasing sensitivity of personal information has led to the widespread adoption of encryption technology for unstructured files and various applications.
DongCheon Kim, Seog Chung Seo
exaly +5 more sources
Optimization of PBKDF2 Using HMAC-SHA2 and HMAC-LSH Families in CPU Environment [PDF]
Password-Based Key Derivation Function 2 (PBKDF2) is widely used cryptographic algorithm in order to generate secure keys to a password in various occasions. For example, it is used for file encryption and implementation of authentication systems, and so
Hojin Choi, Seog Chung Seo
exaly +4 more sources
Password-based key derivation functions are of particular interest in cryptography because they (a) input a password/passphrase (which usually is short and lacks enough entropy) and derive a cryptographic key; (b) slow down brute force and dictionary attacks as much as possible. In PKCS#5 [17], RSA Laboratories described a password based key derivation
Andrea Visconti
exaly +5 more sources
Examining PBKDF2 security margin—Case study of LUKS
Abstract Passwords are widely used to protect our sensitive information or to gain access to specific resources. They should be changed frequently and be strong enough to prevent well-known attacks. Unfortunately, user-chosen passwords are usually short and lack sufficient entropy.
Andrea Visconti, Milan Broz
exaly +5 more sources
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world.
Nada Abdul Aziz Mustafa
doaj +4 more sources
This work presents a hybrid chaotic–cryptographic image encryption method that integrates a physical two-dimensional delta-kicked oscillator with a PBKDF2-HMAC-SHA256 key derivation function (KDF).
Javier Alberto Vargas Valencia +4 more
exaly +5 more sources
Optimization of PBKDF2-HMAC-SHA256 and PBKDF2-HMAC-LSH256 in CPU Environments [PDF]
Password-Based Key Derivation Function 2 (PBKDF2) is widely used cryptographic algorithm in order to generate secure keys to a password in various occasions. For example, it is used for file encryption and implementation of authentication systems, and so on.
Hojin Choi, Seog Chung Seo
exaly +4 more sources
On the Security Analysis of PBKDF2 in OpenOffice [PDF]
Xiaochao Li +8 more
exaly +3 more sources
AN EFFECTIVE MECHANISM FOR SECURING AND MANAGING PASSWORD USING AES-256 ENCRYPTION & PBKDF2
Rajeshree Khande +3 more
exaly +3 more sources

