Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,305 papers from all fields of science
Search
Sign In
Create Free Account
Password Hashing Competition
The Password Hashing Competition was an open competition announced in 2013 to select one or more password hash functions that can be recognized as a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Advanced Encryption Standard process
Argon2
BLAKE (hash function)
Crypt (C)
Expand
Broader (1)
History of cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
HASHING ARGON2 UNTUK KEAMANAN PASSWORD PADA SISTEM BERBASIS WEB MENGGUNAKAN PHP
Suendri Suendri
2019
Corpus ID: 208089336
Username dan Password merupakan bentuk autentikasi utama yang biasa digunakan pada sistem berbasis web. Melalui kombinasi…
Expand
2017
2017
Reusable Authentication from the Iris
Sailesh Simhadri
,
James Steel
,
Benjamin Fuller
IACR Cryptology ePrint Archive
2017
Corpus ID: 3634982
Mobile platforms use biometrics for authentication. Biometrics exhibit noise between repeated readings. Due to the noise…
Expand
2017
2017
Designing generic asymmetric key cryptosystem with message paddings
Tarun Kumar Bansal
2017
Corpus ID: 196056094
This thesis focuses on structural remodelling and security proof of cryptographic schemes. A message pre-processing, also known…
Expand
2016
2016
Analyses of the advantages and risk aversion of chain management
Na Liu
2016
Corpus ID: 156686446
With the rapid progress of economic and social development, the chain management as a typical representative of business, has…
Expand
Review
2015
Review
2015
Password Hashing Algorithms - From Past to Future
Tran Song Dat Phuc
,
Changhoon Lee
2015
Corpus ID: 64158071
Password is a simple technique users do use to protect and authenticate their private information. It is employed popularly as an…
Expand
Review
2014
Review
2014
Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks
C. Forler
,
Eik List
,
S. Lucks
,
Jakob Wenzel
Passwords
2014
Corpus ID: 195981
In this work we provide an overview of the candidates of the Password Hashing Competition (PHC) regarding to their functionality…
Expand
2014
2014
Cryptographic Module Based Approach for Password Hashing Schemes
D. Chang
,
Arpan Jati
,
Sweta Mishra
,
S. Sanadhya
Passwords
2014
Corpus ID: 27051746
Password Hashing is the technique of performing one-way transformation of the password. One of the requirements of password…
Expand
2013
2013
On the Evolution of Choice Principles
M. Franke
,
P. Galeazzi
2013
Corpus ID: 16361913
We compare level-k utility maximization and level-k regret minimization in evolutionary competition based on averages of one-shot…
Expand
2012
2012
Combined Forecasts: What to Do When One Model Isn't Good Enough
E. Blair
,
Michael J. Leonard
,
Bruce Elsheimer
2012
Corpus ID: 38441362
SAS® High-Performance Forecasting 4.1 offers a new, innovative process for automatically combining forecasts. Forecast…
Expand
2003
2003
Creating Competition & Mastering Markets' New Entrants, Monopolists, and Regulators in Transforming Public Utilities Across the Atlantic
W. Hulsink
,
E. Wubben
2003
Corpus ID: 90175472
This paper is on the transformation of network industries or public utilities in Western Europe and the United States (US). A…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE