- Full text PDF available (9)
- This year (1)
- Last 5 years (8)
- Last 10 years (16)
Journals and Conferences
M3lcrypt (canonical M3lcryptH) is a password based key derivation function built around the Merkle-Damgard hash function H. It supports large [pseudo]random salt values (≥ 128-bit) and password lengths.
This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document… (More)
• An integer n with c ≤ n ≤ b. Secret EdDSA scalars have exactly n+ 1 bits, with the top bit (the 2 position) always set and the bottom c bits always cleared. The original specification of EdDSA did not include this parameter: it implicitly took n = b−2. Choosing n sufficiently large is important for security: standard “kangaroo” attacks use approximately… (More)
This document describes how to use a Generic Security Service Application Program Interface (GSS-API) mechanism in the Simple Authentication and Security Layer (SASL) framework. This is done by defining a new SASL mechanism family, called GS2. This mechanism family offers a number of improvements over the previous "SASL/ GSSAPI" mechanism: it is more… (More)
This document contains test vectors for the stream cipher RC4.