Skip to search formSkip to main contentSkip to account menu

Password Hashing Competition

The Password Hashing Competition was an open competition announced in 2013 to select one or more password hash functions that can be recognized as a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Квалiфiкацiйна робота мiстить: 52 стор., 6 рисункiв, 3 таблицi, 30 джерел. Наразi для надiйного зберiгання паролi… 
2017
2017
This thesis focuses on structural remodelling and security proof of cryptographic schemes. A message pre-processing, also known… 
2017
2017
Passwords are the most widely deployed means of human-computer authentication since the early 1960s. The use of passwords, which… 
Review
2017
Review
2017
During the previous decades, the upcoming demand for security in the digital world, e.g., the Internet, lead to numerous… 
2016
2016
  • Na Liu
  • 2016
  • Corpus ID: 156686446
With the rapid progress of economic and social development, the chain management as a typical representative of business, has… 
Review
2015
Review
2015
Password is a simple technique users do use to protect and authenticate their private information. It is employed popularly as an… 
2013
2013
We compare level-k utility maximization and level-k regret minimization in evolutionary competition based on averages of one-shot… 
2012
2012
SAS® High-Performance Forecasting 4.1 offers a new, innovative process for automatically combining forecasts. Forecast… 
2011
2011
General purpose computing on GPUs provides a way for certain applications to benefit from a commonly available massively parallel…