Results 101 to 110 of about 1,020 (118)

Understanding Optimizations and Measuring Performances of PBKDF2

open access: closedLecture Notes on Data Engineering and Communications Technologies, 2019
Password-based key derivation functions (KDFs) are used to generate secure keys of arbitrary length implemented in many security-related systems. The strength of these KDFs is the ability to provide countermeasures against brute-force/dictionary attacks. One of the most implemented KDFs is PBKDF2. In order to slow attackers down, PBKDF2 uses a salt and
Andrea Visconti
exaly   +4 more sources

A modified PBKDF2-based MAC scheme XKDF

open access: closedTENCON 2015 - 2015 IEEE Region 10 Conference, 2015
PBKDF2 is a widely used password-based key derivation function as well as a message authentication code scheme. It is currently applied in Android backup file and Mac OS login security applications. In this paper, we propose a modified PBKDF2-based MAC scheme, denoted as XKDF.
Xiaochao Li
exaly   +3 more sources

Energy-Efficient Hardware Implementation of LUKS PBKDF2 with AES on FPGA

open access: closed2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Linux Unified Key Setup (LUKS) is a popular disk encryption specification for Linux operating system. It is the first time to implement the operations of LUKS with regard to FPGA architectures, which includes PBKDF2-SHA1 and AES128-ECB cipher. The application of this implementation to LUKS password recovering is verified with ARM processor in Zynq SoC.
Xiaochao Li
exaly   +3 more sources

Proposal for SZRP protocol with the establishment of the salted SHA-256 Bit HMAC PBKDF2 advance security system in a MANET

open access: closed2014 International Conference on Electrical Engineering and Information & Communication Technology, 2014
The cooperative junction of mobile nodes consists of any centralized access point or a self-configuring network existing infrastructure without the required intervention is called ad hoc network. A well designed security protocol is a challenging task due to its unique characteristics such as, lack of central authority, frequent topology changes, rapid
Md. Torikur Rahman, MdJulkar Nayeen Mahi
exaly   +3 more sources

A proof-of-work based on MH-PBKDF2 algorithm

open access: closed2021 Ninth International Conference on Advanced Cloud and Big Data (CBD), 2022
Wei Zheng
exaly   +3 more sources

CSIP: A Compact Scrypt IP design with single PBKDF2 core for Blockchain mining

open access: closed2022 35th SBC/SBMicro/IEEE/ACM Symposium on Integrated Circuits and Systems Design (SBCCI), 2022
Thi Hong Tran
exaly   +3 more sources

USER AUTHENTICATION USING THE AES-GSM ALGORITHM AND PBKDF2 FUNCTION

open access: closedComputer systems and network
This paper presents a cryptographic user authentication protocol based on AES in Galois/Counter Mode (GCM) and key derivation using PBKDF2-HMAC-SHA256. The proposed scheme follows a challenge–response model and ensures confidentiality, integrity, and authenticity of transmitted data without disclosing or storing the password in plaintext.
M. Hodovana
openalex   +2 more sources

Web application security, implementation based on PBKDF2 (Angular 2+ and .Net Core 3+)

open access: closed, 2020
Daniel Rodrigues Ferraz Izario   +2 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy