Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Argon2

Argon2 is a key derivation function that was selected as the winner of the Password Hashing Competition in July 2015. It was designed by Alex… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
We develop an economic model of an offline password cracker which allows us to make quantitative predictions about the fraction… Expand
  • table 1
  • table 2
  • figure 1
  • table 4
  • table 5
Is this relevant?
2018
2018
Research partially supported by the Spanish Government under Project Grant TEC2014-54110-R (CASUS). 
  • figure 3
  • figure 5
  • figure 6
  • figure 7
  • figure 8
Is this relevant?
2018
2018
We consider the computational complexity of finding a legal black pebbling of a DAG $G=(V,E)$ with minimum cumulative cost. A… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2018
2018
Memory Hard Functions (MHFs) have been proposed as an answer to the growing inequality between the computational speed of general… Expand
  • figure 1
Is this relevant?
2017
2017
  • J. Alwen, J. Blocki
  • IEEE European Symposium on Security and Privacy…
  • 2017
  • Corpus ID: 10308500
The algorithm Argon2i-B of Biryukov, Dinu and Khovratovich is currently being considered by the IRTF (Internet Research Task… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 2
  • figure 5
Is this relevant?
2017
2017
A memory-hard function (MHF) ƒn with parameter n can be computed in sequential time and space n. Simultaneously, a high amortized… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2017
2017
Argon2i is a data-independent memory hard function that won the password hashing competition. The password hashing algorithm has… Expand
  • table 1
Is this relevant?
Highly Cited
2016
Highly Cited
2016
We present a new hash function Argon2, which is oriented at protection of low-entropy secrets without secret keys. It requires a… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
2016
2016
We present the Balloon password-hashing algorithm. This is the first practical cryptographic hash function that: (i) has proven… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2016
2016
We present the Balloon algorithm for password hashing. This is the first cryptographic hash function that: (i) has proven… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?