Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,265,206 papers from all fields of science
Search
Sign In
Create Free Account
Scrypt
Known as:
NeoScrypt
In cryptography, scrypt (pronounced "ess crypt") is a password-based key derivation function created by Colin Percival, originally for the Tarsnap…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
33 relations
Application-specific integrated circuit
Auroracoin
Bcrypt
Coinye
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Inflation Propensity of Collatz Orbits: A New Proof-of-Work for Blockchain Applications
Fabian Bocart
Journal of Risk and Financial Management
2018
Corpus ID: 53335468
Cryptocurrencies such as Bitcoin rely on a proof-of-work system to validate transactions and prevent attacks or double-spending…
Expand
2018
2018
RANCANG BANGUN SISTEM INFORMASI BERBAGI LOKASI BERBASIS ANDROID DENGAN IMPLEMENTASI ALGORITMA SCRYPT PADA PROSES AUTENTIFIKASI
Faiz Faidurrahman
,
G. Gumilar
2018
Corpus ID: 195504253
Penelitian ini bertujuan untuk merancang dan membangun sistem informasi berbagi lokasi dengan mengimplementasikan algoritma…
Expand
2018
2018
PROJECT REPORTSHA256 & SCRYPT ALGORITHM PROBABILITYANALYSIS OF FINDING NEW BLOCK ON BLOCKCHAIN TECHNOLOGY
Novan Ageng Mulyadi
2018
Corpus ID: 108331219
In the language of cryptocurrency, a block is a record of new transactions that could mean the location of cryptocurrency, or…
Expand
Review
2017
Review
2017
A Survey on Privacy Preservation and Anonymization of Data in Cloud Computing
A. R. Patil
,
M. Kodmelwar
,
M. E. Student
2017
Corpus ID: 212503792
: In cloud computing maintaining the anonymity of data to be shared across multiple entities is crucial for privacy of users in…
Expand
2016
2016
Balloon Hashing : a Provably Memory-Hard Function with a Data-Independent Access Pattern
D. Boneh
,
Henry Corrigan-Gibbs
,
Stuart E. Schechter
2016
Corpus ID: 16551666
We present the Balloon algorithm for password hashing. This is the first cryptographic hash function that: (i) has proven…
Expand
2015
2015
Performance Analysis of Some Password Hashing Schemes
D. Chang
,
A. Jati
,
Sweta Mishra
,
S. K. Sanadhya
IACR Cryptology ePrint Archive
2015
Corpus ID: 27939230
In this work we have analyzed some password hashing schemes for performance under various settings of time and memory…
Expand
Review
2015
Review
2015
Password Hashing Algorithms - From Past to Future
Tran Song Dat Phuc
,
Changhoon Lee
2015
Corpus ID: 64158071
Password is a simple technique users do use to protect and authenticate their private information. It is employed popularly as an…
Expand
2015
2015
Analysis Design & Applications of Cryptographic Building Blocks
C. Forler
2015
Corpus ID: 37257830
This thesis deals with the basic design and rigorous analysis of cryptographic schemes and primitives, especially of…
Expand
2014
2014
NeoScrypt , a Strong Memory Intensive Key Derivation Function
J. Doering
2014
Corpus ID: 8392314
Hereby presented a new password based memory intensive cryptographic solution designed for general purpose computer hardware. A…
Expand
2008
2008
SCrypt : Using Symbolic Computation to Bridge the Gap Between Algebra and Cryptography
Burçin Eröcal
2008
Corpus ID: 16107799
The first step in algebraic cryptanalysis is to obtain a system of polynomial equations representing a cryptosystem. Even though…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE