Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,798,302 papers from all fields of science
Search
Sign In
Create Free Account
PBKDF2
Known as:
PBKDF
, PBKDF1
PBKDF2 (Password-Based Key Derivation Function 2) is part of RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, specifically PKCS #5…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
36 relations
1Password
Application-specific integrated circuit
Argon2
Bcrypt
Expand
Broader (1)
Cryptography standards
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Tsundoku: Sistema de recomendación web de literatura en Django
Laura Canelada Velasco
2019
Corpus ID: 213286013
Este proyecto de fin de grado propone un sistema de recomendacion web donde el objeto a recomendar seran libros de todos los…
Expand
2018
2018
On Resilient Password-Based Key Derivation Functions
Jason Hennessey
,
Sarah Scheffler
,
Mayank Varia
2018
Corpus ID: 53701242
Password-based key derivation functions (PBKDFs) create keys that are used to protect a great wealth of private information. In…
Expand
2015
2015
A modified PBKDF2-based MAC scheme XKDF
Xiurong Chen
,
Xiaochao Li
,
Yihui Chen
,
Pengtao Li
,
J. Xing
,
Lin Li
IEEE Region 10 Conference
2015
Corpus ID: 2195124
PBKDF2 is a widely used password-based key derivation function as well as a message authentication code scheme. It is currently…
Expand
2015
2015
On the Security Analysis of PBKDF2 in OpenOffice
Xiaochao Li
,
Cuicui Zhao
,
+5 authors
Donghui Guo
Journal of Software
2015
Corpus ID: 45684748
Password-based KDF2 (PBKDF2) is widely used in file authentication mechanism and file encryption which could produce a derived…
Expand
Review
2015
Review
2015
Password Hashing Algorithms - From Past to Future
Tran Song Dat Phuc
,
Changhoon Lee
2015
Corpus ID: 64158071
Password is a simple technique users do use to protect and authenticate their private information. It is employed popularly as an…
Expand
2013
2013
The Security of Key Derivation Functions in WINRAR
Jing Chen
,
Jun Zhou
,
Kun Pan
,
Shuqiang Lin
,
Cuicui Zhao
,
Xiaochao Li
Journal of Computers
2013
Corpus ID: 11816066
In various versions of WINRAR, the file security is mainly protected by user authentication and files encryption. Password based…
Expand
2013
2013
Implementasi Algoritma Kriptografi Twofish Pada Aplikasi Pengaman Berkas Digital
Alvin Kurniawan
2013
Corpus ID: 56501233
Suatu aplikasi pengaman berkas digital berbasis algoritma kriptografi twofish dengan mode Cipher Block Chaining (CBC). Tujuan…
Expand
2013
2013
Pair & Hybrid Based Authentication Technique using PBKDF2
Priyanka Kedar
,
V. Bhusari
2013
Corpus ID: 61186789
Everyone used the text password method for authentication. Authentication is used for information security. For authentication…
Expand
2013
2013
A Novel Fast Implementation of PBKDF2
Yuan Fe
2013
Corpus ID: 63419009
PBKDF2(Password Based Key Derivation Function 2),as a part of Public Key Cryptography Standard #5 by RSA and a key algorithm for…
Expand
2012
2012
On the security of key derivation functions in office
Jun Zhou
,
Jing Chen
,
Kun Pan
,
Cuicui Zhao
,
Xiaochao Li
Anti-counterfeiting, Security, and Identification
2012
Corpus ID: 11365778
In Microsoft Office, the file security is mainly protected by user authentication and files encryption. The cryptographic keys…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required