Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,206,860 papers from all fields of science
Search
Sign In
Create Free Account
Bcrypt
bcrypt is a password hashing function designed by Niels Provos and David Mazières, based on the Blowfish cipher, and presented at USENIX in 1999…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Brute-force search
Ccrypt
Crypt (C)
Cryptographic hash function
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Optimizing MAKWA on GPU and CPU
T. Pornin
IACR Cryptology ePrint Archive
2015
Corpus ID: 18518468
We present here optimized implementations of the MAKWA password hashing function on an AMD Radeon HD 7990 GPU, and compare its…
Expand
2012
2012
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
L. Batina
,
Y. Lee
,
Stefaan Seys
,
Dave Singelée
,
I. Verbauwhede
Personal and Ubiquitous Computing
2012
Corpus ID: 3730130
Since the introduction of the concept of grouping proofs by Juels, which permit RFID tags to generate evidence that they have…
Expand
2012
2012
A Metric to Evaluate Interaction Obfuscation in Online Social Networks
Ero Balsa
,
C. Troncoso
,
Claudia Díaz
Int. J. Uncertain. Fuzziness Knowl. Based Syst.
2012
Corpus ID: 18409149
Online social networks (OSNs) have become one of the main communication channels in today's information society, and their…
Expand
2011
2011
Secure Communication via Shared Knowledge and a Salted Hash in Ad-Hoc Environments
A. Kent
,
L. Liebrock
IEEE 35th Annual Computer Software and…
2011
Corpus ID: 12029110
Decentralized, message-based communication networks commonly require mechanisms for message confidentiality and integrity. While…
Expand
2011
2011
A Privacy-Preserving ID-Based Group Key Agreement Scheme Applied in VPAN
Yoni De Mulder
,
K. Wouters
,
B. Preneel
Conference on Current Trends in Theory and…
2011
Corpus ID: 40735728
In 2008, Wan et al. presented an anonymous ID-based group key agreement scheme for wireless networks, for which they claim that…
Expand
2010
2010
Refinements of the ALRED construction and MAC security claims
J. Daemen
,
V. Rijmen
IET Information Security
2010
Corpus ID: 17389230
The authors present three security claims for iterated message authentication codes (MAC functions). Next, they propose ALRED, a…
Expand
2009
2009
RE-TRUST: Trustworthy Execution of SW on Remote Untrusted Platforms
B. Wyseur
Information Security Solutions Europe
2009
Corpus ID: 20623406
A major challenge in software security is preserving software integrity. Traditionally this problem is addressed through the…
Expand
2008
2008
Statistical Analysis of Silicon PUF responses for Device Identification
Roel Maes
,
P. Tuyls
,
I. Verbauwhede
2008
Corpus ID: 3738459
Silicon PUFs have been developed as a method for identification of integrated circuits based on the unique behavior of delay…
Expand
2008
2008
Extended abstract: Unified digit-serial multiplier/inverter in finite field GF(2m)
Junfeng Fan
,
I. Verbauwhede
IEEE International Workshop on Hardware-Oriented…
2008
Corpus ID: 3715797
Modular multiplication and inversion are the essential operations in both elliptic curve cryptosystems (ECC) and hyperelliptic…
Expand
2007
2007
DPA-Resistance Without Routing Constraints? - A Cautionary Note About MDPL Security -
Benedikt Gierlichs
2007
Corpus ID: 14510799
MDPL is a logic style claiming to provide resistance against Differential Side Channel Analysis on power consumption measurements…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE