Results 101 to 110 of about 1,020 (118)
Understanding Optimizations and Measuring Performances of PBKDF2
Password-based key derivation functions (KDFs) are used to generate secure keys of arbitrary length implemented in many security-related systems. The strength of these KDFs is the ability to provide countermeasures against brute-force/dictionary attacks. One of the most implemented KDFs is PBKDF2. In order to slow attackers down, PBKDF2 uses a salt and
Andrea Visconti
exaly +4 more sources
A modified PBKDF2-based MAC scheme XKDF
PBKDF2 is a widely used password-based key derivation function as well as a message authentication code scheme. It is currently applied in Android backup file and Mac OS login security applications. In this paper, we propose a modified PBKDF2-based MAC scheme, denoted as XKDF.
Xiaochao Li
exaly +3 more sources
Energy-Efficient Hardware Implementation of LUKS PBKDF2 with AES on FPGA
Linux Unified Key Setup (LUKS) is a popular disk encryption specification for Linux operating system. It is the first time to implement the operations of LUKS with regard to FPGA architectures, which includes PBKDF2-SHA1 and AES128-ECB cipher. The application of this implementation to LUKS password recovering is verified with ARM processor in Zynq SoC.
Xiaochao Li
exaly +3 more sources
The cooperative junction of mobile nodes consists of any centralized access point or a self-configuring network existing infrastructure without the required intervention is called ad hoc network. A well designed security protocol is a challenging task due to its unique characteristics such as, lack of central authority, frequent topology changes, rapid
Md. Torikur Rahman, MdJulkar Nayeen Mahi
exaly +3 more sources
A proof-of-work based on MH-PBKDF2 algorithm
Wei Zheng
exaly +3 more sources
CSIP: A Compact Scrypt IP design with single PBKDF2 core for Blockchain mining
Thi Hong Tran
exaly +3 more sources
USER AUTHENTICATION USING THE AES-GSM ALGORITHM AND PBKDF2 FUNCTION
This paper presents a cryptographic user authentication protocol based on AES in Galois/Counter Mode (GCM) and key derivation using PBKDF2-HMAC-SHA256. The proposed scheme follows a challenge–response model and ensures confidentiality, integrity, and authenticity of transmitted data without disclosing or storing the password in plaintext.
M. Hodovana
openalex +2 more sources
Web application security, implementation based on PBKDF2 (Angular 2+ and .Net Core 3+)
Daniel Rodrigues Ferraz Izario +2 more
openalex +2 more sources
An efficient implementation of PBKDF2 with RIPEMD-160 on multiple FPGAs
Lars Wienbrandt
exaly +2 more sources

