The article considers methods of fixing storing passwords in hashed form security vulnerability. Suggested hashing algorithm is based on the specifics of architecture of modern graphics processors
Abstract—It has become much easier to crack a password hash with the advancements in the graphicalpr...
A distributed brute force algorithm to solve the problem of diminishing returns when more processors...
The aim of the article is to present the password breaking methodology in case when an attacker (for...
Since users rely on passwords to authenticate themselves to computer systems, ad-versaries attempt t...
This work describes one - way hash functions and cryptographic algorithms . It also describes their ...
Due to the development of GPGPU (General Purpose Graphic Processing Unit) technology, GPU has been a...
Password authentication is one of the widely used methods to achieve authentication for legal users ...
To be a part of this modern society, we have to register for online accounts and have to swallow the...
We present here optimized implementations of the MAKWA password hashing function on an AMD Radeon HD...
Homomorphic hash functions (HHF) play a key role in securing distributed systems that use coding tec...
This paper presents an accelerator design for the password recovery of sha256crypt based on hybrid C...
Contains fulltext : 103778.pdf (publisher's version ) (Closed access)SHARCS 2012 :...
Modern computing platforms are becoming increasingly heterogeneous, combining a main processor with ...
In the digital world, the demand for data security during communication has increased. Hash function...
A secure cryptographic hashing function should be resistant to three different scenarios: First, a c...
Abstract—It has become much easier to crack a password hash with the advancements in the graphicalpr...
A distributed brute force algorithm to solve the problem of diminishing returns when more processors...
The aim of the article is to present the password breaking methodology in case when an attacker (for...
Since users rely on passwords to authenticate themselves to computer systems, ad-versaries attempt t...
This work describes one - way hash functions and cryptographic algorithms . It also describes their ...
Due to the development of GPGPU (General Purpose Graphic Processing Unit) technology, GPU has been a...
Password authentication is one of the widely used methods to achieve authentication for legal users ...
To be a part of this modern society, we have to register for online accounts and have to swallow the...
We present here optimized implementations of the MAKWA password hashing function on an AMD Radeon HD...
Homomorphic hash functions (HHF) play a key role in securing distributed systems that use coding tec...
This paper presents an accelerator design for the password recovery of sha256crypt based on hybrid C...
Contains fulltext : 103778.pdf (publisher's version ) (Closed access)SHARCS 2012 :...
Modern computing platforms are becoming increasingly heterogeneous, combining a main processor with ...
In the digital world, the demand for data security during communication has increased. Hash function...
A secure cryptographic hashing function should be resistant to three different scenarios: First, a c...
Abstract—It has become much easier to crack a password hash with the advancements in the graphicalpr...
A distributed brute force algorithm to solve the problem of diminishing returns when more processors...
The aim of the article is to present the password breaking methodology in case when an attacker (for...