Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,434,862 papers from all fields of science
Search
Sign In
Create Free Account
Bcrypt
bcrypt is a password hashing function designed by Niels Provos and David Mazières, based on the Blowfish cipher, and presented at USENIX in 1999…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Brute-force search
Ccrypt
Crypt (C)
Cryptographic hash function
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
An Enhanced Hash-based Message Authentication Code using BCrypt
Jerone B. Alimpia
2018
Corpus ID: 64572260
: Many message authentication codes like HMAC depend on its underlying cryptographic algorithm. Unfortunately most of these…
Expand
2015
2015
Optimizing MAKWA on GPU and CPU
T. Pornin
IACR Cryptology ePrint Archive
2015
Corpus ID: 18518468
We present here optimized implementations of the MAKWA password hashing function on an AMD Radeon HD 7990 GPU, and compare its…
Expand
2015
2015
Cryptanalysis of bcrypt and SHA-512 using Distributed Processing over the Cloud
Atishay Aggarwal
,
P. Chaphekar
,
Rohit Mandrekar
2015
Corpus ID: 1046456
Passwords are one of the commonly used method to protect one’s personal information against the intruders. But storing passwords…
Expand
2012
2012
A study on algorithms supported by CNG of Windows Operating System
M. Bharti
2012
Corpus ID: 111202331
Cryptography Next Generation is an encryption Application Program Interface (API) which has been found out by Microsoft, in order…
Expand
2011
2011
Security Analysis of the Rasmussen-Čapkun CRCS Distance Bounding Protocol
Dave Singelée
,
B. Preneel
2011
Corpus ID: 30899979
Rasmussen and Čapkun recently presented the first practical realization of an RFbased distance bounding protocol. By using the…
Expand
2009
2009
ZesT: an all-purpose hash function based on Zemor-Tillich
C. Petit
,
G. D. Meulenaer
,
J. Quisquater
,
J. Tillich
,
Nicolas Veyrat-Charvillon
,
G. Zémor
2009
Corpus ID: 52840537
Hash functions are a very important cryptographic primitive. The collision resistance of provable hash functions relies on hard…
Expand
2009
2009
Practical Preimages for Maraca
Symmetric Cryptography
2009
Corpus ID: 8015742
We show a practical preimage attack on the cryptographic hash function Maraca, which was submitted as a candidate to the NIST SHA…
Expand
2008
2008
Statistical Analysis of Silicon PUF responses for Device Identification
Roel Maes
,
P. Tuyls
,
I. Verbauwhede
2008
Corpus ID: 3738459
Silicon PUFs have been developed as a method for identification of integrated circuits based on the unique behavior of delay…
Expand
2008
2008
Anonymous ID-based Group Key Agreement scheme applied in Virtual Private Ad Hoc Networks
Yoni De Mulder
,
K. Wouters
,
B. Preneel
2008
Corpus ID: 3109077
As more and more mobile devices interconnect through largescale IP networks, new network architectures become important. A…
Expand
2007
2007
DPA-Resistance Without Routing Constraints? - A Cautionary Note About MDPL Security -
Benedikt Gierlichs
2007
Corpus ID: 14510799
MDPL is a logic style claiming to provide resistance against Differential Side Channel Analysis on power consumption measurements…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE