# Argon2

## Papers overview

Semantic Scholar uses AI to extract papers important to this topic.

2018

2018

- IEEE Symposium on Security and Privacy (SP)
- 2018

We develop an economic model of an offline password cracker which allows us to make quantitative predictions about the fraction… Expand

Is this relevant?

2017

2017

- ACM Conference on Computer and Communications…
- 2017

A memory-hard function (MHF) ƒn with parameter n can be computed in sequential time and space n. Simultaneously, a high amortized… Expand

Is this relevant?

Highly Cited

2016

Highly Cited

2016

- IEEE European Symposium on Security and Privacy…
- 2016

We present a new hash function Argon2, which is oriented at protection of low-entropy secrets without secret keys. It requires a… Expand

Is this relevant?

2016

2016

- Financial Cryptography
- 2016

We consider the computational complexity of finding a legal black pebbling of a DAG $G=(V,E)$ with minimum cumulative cost. A… Expand

Is this relevant?

Review

2016

Review

2016

- IACR Cryptology ePrint Archive
- 2016

In this document we present an overview of the background to and goals of the Password Hashing Competition (PHC) as well as the… Expand

Is this relevant?

2016

2016

- ASIACRYPT
- 2016

We present the Balloon password-hashing algorithm. This is the first practical cryptographic hash function that: (i) has proven… Expand

Is this relevant?

2016

2016

- USENIX Security Symposium
- 2016

In this paper we explore several contexts where an adversary has an upper hand over the defender by using special hardware in an… Expand

Is this relevant?

2015

2015

- 2015

This document describes the Argon2 memory-hard function for password
hashing and other applications. We provide a implementer… Expand

Is this relevant?

2000

2000

- ICPP Workshops
- 2000

This paper focuses on scrypt, a simple candidate MHF designed by Percival, and described in RFC 7914. It has been used within a… Expand

Is this relevant?

1999

1999

- 1999

This document describes the Argon2 memory-hard function for password
hashing and proof-of-work applications. We provide an… Expand

Is this relevant?