2013
DOI: 10.4304/jcp.8.9.2262-2268
|View full text |Cite
|
Sign up to set email alerts
|

The Security of Key Derivation Functions in WINRAR

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…It was also used in Blackberry and IOS systems [46]. It is also used in TrueCrypt, WPA2, WinRAR [47] and many more.…”
Section: Pbkdf2: Password Based Key Derivation Functionmentioning
confidence: 99%
“…It was also used in Blackberry and IOS systems [46]. It is also used in TrueCrypt, WPA2, WinRAR [47] and many more.…”
Section: Pbkdf2: Password Based Key Derivation Functionmentioning
confidence: 99%
“…Compared with other physical and biological characteristics of the authentication schemes, password-based message authentication scheme is widely employed [3]. Generally speaking, passwords chosen from a relatively small space (or have a low entropy) is vulnerable to exhaustive password-search attacks and dictionary attacks.…”
Section: Introductionmentioning
confidence: 99%