2018
DOI: 10.1007/s10207-018-0405-5
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalytic time–memory trade-off for password hashing schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 9 publications
0
3
0
1
Order By: Relevance
“…They highlight the shortcomings of Argon2i in achieving its stated memory hardness goals. The research provides valuable perspectives on the resilience and efficiency of password hashing schemes considering different time and memory resource allocation scenarios (Chang et al, 2019).…”
Section: Analysis Of Rainbow Tables E Cacy In Password Hashing Schemesmentioning
confidence: 99%
“…They highlight the shortcomings of Argon2i in achieving its stated memory hardness goals. The research provides valuable perspectives on the resilience and efficiency of password hashing schemes considering different time and memory resource allocation scenarios (Chang et al, 2019).…”
Section: Analysis Of Rainbow Tables E Cacy In Password Hashing Schemesmentioning
confidence: 99%
“…Password-based user authentication methods are a powerful means of protecting the private information of users in the field of information security [1,2]. When choosing a password, security and convenience conflict [3,4]. For example, although complex passwords that combine numbers and special symbols like "toeq39bf@la" are inconvenient to use because they are difficult to remember, they are safe because they are not easily inferred by others.…”
Section: Introductionmentioning
confidence: 99%
“…Деякі фреймворки можуть використовувати базові схеми хешування, такі як SHA256 або SHA512, що покращує безпеку в порівнянні з MD5 і SHA1, проте вони все ще можуть бути вразливі до атак з використанням спеціалізованих апаратних засобів або паралельних обчислень [6].…”
unclassified