Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,292,036 papers from all fields of science
Search
Sign In
Create Free Account
Password Hashing Competition
The Password Hashing Competition was an open competition announced in 2013 to select one or more password hash functions that can be recognized as a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Advanced Encryption Standard process
Argon2
BLAKE (hash function)
Crypt (C)
Expand
Broader (1)
History of cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Порівняльний аналіз сучасних схем гешування паролів
В. В. Бурлака
2018
Corpus ID: 191180942
Квалiфiкацiйна робота мiстить: 52 стор., 6 рисункiв, 3 таблицi, 30 джерел. Наразi для надiйного зберiгання паролi…
Expand
2017
2017
Designing generic asymmetric key cryptosystem with message paddings
Tarun Kumar Bansal
2017
Corpus ID: 196056094
This thesis focuses on structural remodelling and security proof of cryptographic schemes. A message pre-processing, also known…
Expand
2017
2017
Design and analysis of password based authentication systems
Sweta Mishra
,
D. Chang
,
S. K. Sanadhya
2017
Corpus ID: 66988676
Passwords are the most widely deployed means of human-computer authentication since the early 1960s. The use of passwords, which…
Expand
Review
2017
Review
2017
Design and Analysis of Cryptographic Algorithms for Authentication
Jakob Wenzel
Krypto-Tag
2017
Corpus ID: 40224439
During the previous decades, the upcoming demand for security in the digital world, e.g., the Internet, lead to numerous…
Expand
2016
2016
Analyses of the advantages and risk aversion of chain management
Na Liu
2016
Corpus ID: 156686446
With the rapid progress of economic and social development, the chain management as a typical representative of business, has…
Expand
Review
2015
Review
2015
Password Hashing Algorithms - From Past to Future
Tran Song Dat Phuc
,
Changhoon Lee
2015
Corpus ID: 64158071
Password is a simple technique users do use to protect and authenticate their private information. It is employed popularly as an…
Expand
2015
2015
The Catena Password-Scrambling Framework 2 nd Round of the Password Hashing Competition ( PHC )
C. Forler
,
S. Lucks
,
Jakob Wenzel
2015
Corpus ID: 11562876
2013
2013
On the Evolution of Choice Principles
M. Franke
,
P. Galeazzi
2013
Corpus ID: 16361913
We compare level-k utility maximization and level-k regret minimization in evolutionary competition based on averages of one-shot…
Expand
2012
2012
Combined Forecasts: What to Do When One Model Isn't Good Enough
E. Blair
,
Michael J. Leonard
,
Bruce Elsheimer
2012
Corpus ID: 38441362
SAS® High-Performance Forecasting 4.1 offers a new, innovative process for automatically combining forecasts. Forecast…
Expand
2011
2011
Effects of GPU and CPU Loads on Performance of CUDA Applications
M. Bobrov
,
R. Melton
,
S. Radziszowski
,
M. Lukowiak
2011
Corpus ID: 11537664
General purpose computing on GPUs provides a way for certain applications to benefit from a commonly available massively parallel…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required