Search

Your search keyword '"scrypt"' showing total 41 results

Search Constraints

Start Over You searched for: Descriptor "scrypt" Remove constraint Descriptor: "scrypt"
41 results on '"scrypt"'

Search Results

1. Grover on Scrypt.

2. Parallel Implementation of Scrypt: A Study on GPU Acceleration for Password-Based Key Derivation Function.

3. ENHANCING HYBRID SECURITY APPROACH USING AES AND RSA ALGORITHMS

4. MRSA: A High-Efficiency Multi ROMix Scrypt Accelerator for Cryptocurrency Mining and Data Security

5. ENHANCING HYBRID SECURITY APPROACH USING AES AND RSA ALGORITHMS.

6. Scrypt Is Maximally Memory-Hard

7. Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks

8. On Password Guessing with GPUs and FPGAs

9. SHA-1 and MD5 Cryptographic Hash Functions: Security Overview

10. MRSA: A High-Efficiency Multi ROMix Scrypt Accelerator for Cryptocurrency Mining and Data Security

12. Applications of Blockchain in Cryptocurrency: Bitcoin and Dogecoin

13. Argon2: The Secure Password Hashing Function

14. Brute force attacks on passwords

15. Hardware Implementation For Fast Block Generator Of Litecoin Blockchain System

16. A Reliable and Universal Cloud Wallet

17. Računanje kriptografskih valut z GPE.

18. An Educational Guide to Creating Your Own Cryptocurrency

19. A Reliable and Universal Cloud Wallet

20. Threshold Password-Hardened Encryption Services

21. On the Economics of Offline Password Cracking

22. Attacking memory-hard scrypt with near-data-processing

23. Using the SHA-3 to Derive Encryption Keys Based on Key-File

24. ANALISA KEMUNGKINAN ALGORITMA SHA256 & ALGORITMA SCRYPT DALAM MENEMUKAN BLOK BARU PADA TEKNOLOGI BLOCKCHAIN

25. Analysis and comparison of proof of work distributed consensus algorithms and hash functions

26. Why Johnny Can't Store Passwords Securely?

27. Cryptanalysis of Secure Hash Password Technique (CSHPT) in Linux

28. Optimizing a Password Hashing Function with Hardware-Accelerated Symmetric Encryption

29. Bandwidth Hard Functions for ASIC Resistance

30. Disproving the Conjectures from 'On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model'

31. Lyra: password-based key derivation with tunable memory and processing costs

32. Revisiting Square-Root ORAM: Efficient Random Access in Multi-party Computation

33. Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks

34. Cryptocurrency Mining – Transition to Cloud

35. On Password Guessing with GPUs and FPGAs

36. High-speed implementation of bcrypt password search using special-purpose hardware

37. SHA-1 and MD5 cryptographic hash functions: Security overview

38. Dynamic salt generation for mobile data security using elliptic curves against precomputation attacks

39. Memory-Demanding Password Scrambling

40. Distributed cipher chaining for increased security in password storage

41. Computer experiments on the Khirbet Qeiyafa ostracon

Catalog

Books, media, physical & digital resources