Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,368,462 papers from all fields of science
Search
Sign In
Create Free Account
PBKDF2
Known as:
PBKDF
, PBKDF1
PBKDF2 (Password-Based Key Derivation Function 2) is part of RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, specifically PKCS #5…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
36 relations
1Password
Application-specific integrated circuit
Argon2
Bcrypt
Expand
Broader (1)
Cryptography standards
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Tsundoku: Sistema de recomendación web de literatura en Django
Laura Canelada Velasco
2019
Corpus ID: 213286013
Este proyecto de fin de grado propone un sistema de recomendacion web donde el objeto a recomendar seran libros de todos los…
Expand
2018
2018
SAFEPASS - Presenting a Convenient, Portable and Secure Password Manager
Onur Hakbilen
,
Piraveen Perinparajan
,
M. Eikeland
,
Nils Ulltveit-Moe
International Conference on Information Systems…
2018
Corpus ID: 4779731
SAFEPASS is a password manager implemented as a self-contained application, developed with principles and ideas based on industry…
Expand
2018
2018
On Resilient Password-Based Key Derivation Functions
Jason Hennessey
,
Sarah Scheffler
,
Mayank Varia
2018
Corpus ID: 53701242
Password-based key derivation functions (PBKDFs) create keys that are used to protect a great wealth of private information. In…
Expand
2017
2017
Hybrid Mobile Edge Computing: Unleashing the Full Potential of Edge Computing in Mobile Device Use Cases
Andreas Reiter
,
Bernd Prünster
,
Thomas Zefferer
IEEE/ACM International Symposium on Cluster…
2017
Corpus ID: 25141976
Many different technologies fostering and supporting distributed and decentralized computing scenarios emerged recently. Edge…
Expand
2016
2016
Energy-Efficient Hardware Implementation of LUKS PBKDF2 with AES on FPGA
Xiaochao Li
,
Chunhui Cao
,
Pengtao Li
,
Shuli Shen
,
Yihui Chen
,
Lin Li
IEEE Trustcom/BigDataSE/ISPA
2016
Corpus ID: 21101021
Linux Unified Key Setup (LUKS) is a popular disk encryption specification for Linux operating system. It is the first time to…
Expand
2015
2015
More Rounds, Less Security?
Jian Guo
,
Jérémy Jean
,
N. Mouha
,
I. Nikolic
IACR Cryptology ePrint Archive
2015
Corpus ID: 3772067
This paper focuses on a surprising class of cryptanalysis results for symmetric-key primitives: when the number of rounds of the…
Expand
2015
2015
A modified PBKDF2-based MAC scheme XKDF
Xiurong Chen
,
Xiaochao Li
,
Yihui Chen
,
Pengtao Li
,
J. Xing
,
Lin Li
IEEE Region 10 Conference
2015
Corpus ID: 2195124
PBKDF2 is a widely used password-based key derivation function as well as a message authentication code scheme. It is currently…
Expand
2013
2013
The Security of Key Derivation Functions in WINRAR
Jing Chen
,
Jun Zhou
,
Kun Pan
,
Shuqiang Lin
,
Cuicui Zhao
,
Xiaochao Li
Journal of Computers
2013
Corpus ID: 11816066
In various versions of WINRAR, the file security is mainly protected by user authentication and files encryption. Password based…
Expand
2012
2012
On the security of key derivation functions in office
Jun Zhou
,
Jing Chen
,
Kun Pan
,
Cuicui Zhao
,
Xiaochao Li
Anti-counterfeiting, Security, and Identification
2012
Corpus ID: 11365778
In Microsoft Office, the file security is mainly protected by user authentication and files encryption. The cryptographic keys…
Expand
2010
2010
Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions
D. Gligoroski
,
Vlastimil Klíma
IACR Cryptology ePrint Archive
2010
Corpus ID: 2625364
In a recent note to the NIST hash-forum list, the following observation was presented: narrow-pipe hash functions differ…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE