Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,238,902 papers from all fields of science
Search
Sign In
Create Free Account
Scrypt
Known as:
NeoScrypt
In cryptography, scrypt (pronounced "ess crypt") is a password-based key derivation function created by Colin Percival, originally for the Tarsnap…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
33 relations
Application-specific integrated circuit
Auroracoin
Bcrypt
Coinye
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Inflation Propensity of Collatz Orbits: A New Proof-of-Work for Blockchain Applications
Fabian Bocart
Journal of Risk and Financial Management
2018
Corpus ID: 53335468
Cryptocurrencies such as Bitcoin rely on a proof-of-work system to validate transactions and prevent attacks or double-spending…
Expand
2018
2018
PROJECT REPORTSHA256 & SCRYPT ALGORITHM PROBABILITYANALYSIS OF FINDING NEW BLOCK ON BLOCKCHAIN TECHNOLOGY
Novan Ageng Mulyadi
2018
Corpus ID: 108331219
In the language of cryptocurrency, a block is a record of new transactions that could mean the location of cryptocurrency, or…
Expand
2018
2018
RANCANG BANGUN SISTEM INFORMASI BERBAGI LOKASI BERBASIS ANDROID DENGAN IMPLEMENTASI ALGORITMA SCRYPT PADA PROSES AUTENTIFIKASI
Faiz Faidurrahman
,
G. Gumilar
2018
Corpus ID: 195504253
Penelitian ini bertujuan untuk merancang dan membangun sistem informasi berbagi lokasi dengan mengimplementasikan algoritma…
Expand
Review
2017
Review
2017
A Survey on Privacy Preservation and Anonymization of Data in Cloud Computing
A. R. Patil
,
M. Kodmelwar
,
M. E. Student
2017
Corpus ID: 212503792
: In cloud computing maintaining the anonymity of data to be shared across multiple entities is crucial for privacy of users in…
Expand
2017
2017
Dynamic salt generation for mobile data security using elliptic curves against precomputation attacks
Bh. Padma
,
G. R. Kumar
2017
Corpus ID: 195930596
Pattern lock is a mechanism that most of the people set to their Android smart phones. As the built-in pattern lock system adds…
Expand
2016
2016
Balloon Hashing : a Provably Memory-Hard Function with a Data-Independent Access Pattern
D. Boneh
,
Henry Corrigan-Gibbs
,
Stuart E. Schechter
2016
Corpus ID: 16551666
We present the Balloon algorithm for password hashing. This is the first cryptographic hash function that: (i) has proven…
Expand
2015
2015
Performance Analysis of Some Password Hashing Schemes
D. Chang
,
A. Jati
,
Sweta Mishra
,
S. K. Sanadhya
IACR Cryptology ePrint Archive
2015
Corpus ID: 27939230
In this work we have analyzed some password hashing schemes for performance under various settings of time and memory…
Expand
Review
2015
Review
2015
PERANCANGAN DAN PEMBANGUNAN APLIKASI GLOSHA (GROUPING LOCATION SHARING) DENGAN MENGIMPLEMENTASIKAN ALGORITMA SCRYPT UNTUK ENCRYPT USER PASSWORD
Faiz Faidurrahman
2015
Corpus ID: 60677064
ABSTRAK Tugas Akhir ini membahas tentang perancangan dan pembangunan aplikasi GLoSha dengan mengimplementasikan algortima scrypt…
Expand
2014
2014
NeoScrypt , a Strong Memory Intensive Key Derivation Function
J. Doering
2014
Corpus ID: 8392314
Hereby presented a new password based memory intensive cryptographic solution designed for general purpose computer hardware. A…
Expand
Review
2014
Review
2014
Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks
C. Forler
,
Eik List
,
S. Lucks
,
Jakob Wenzel
Passwords
2014
Corpus ID: 195981
In this work we provide an overview of the candidates of the Password Hashing Competition (PHC) regarding to their functionality…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE