- Key derivation functions - What is the difference between Key stretching and key diversification? https://en.wikipedia.org/wiki/Key_derivation_function 9 comments askcomputerscience
- Are PRNGs Key Derivation Functions? https://en.wikipedia.org/wiki/Key_derivation_function 54 comments crypto
Linking pages
- Email explained from first principles https://explained-from-first-principles.com/email/ 109 comments
- Breaking CityHash64, MurmurHash2/3, wyhash, and more... | orlp.net https://orlp.net/blog/breaking-hash-functions/ 88 comments
- Why I Don't Recommend Scrypt | ircmaxell's Blog http://blog.ircmaxell.com/2014/03/why-i-dont-recommend-scrypt.html 36 comments
- GitHub - Password4j/password4j: Java cryptographic library that supports Argon2, bcrypt, scrypt and PBKDF2 aimed to protect passwords in databases. Easy to use by design, highly customizable, secure and portable. All the implementations follow the standards and have been reviewed to perform better in the JVM. https://github.com/password4j/password4j 34 comments
- Who are you ? What is your secret ? Where are you going ? | by Guillaume | Medium https://medium.com/@guillaume20100/who-are-you-what-is-your-secret-where-are-you-going-60800e93f92#.dpymfowrh 33 comments
- An Information-Theoretic Account of Secure Brainwallets | Ethereum Foundation Blog https://blog.ethereum.org/2014/10/23/information-theoretic-account-secure-brainwallets/ 23 comments
- GitHub - planktonlabs/frozenkrill: A minimalist Bitcoin wallet focused on cold storage https://github.com/planktonlabs/frozenkrill 18 comments
- A Very Technical Look at BitMessage · Zola Gonano https://zolagonano.github.io/blog/posts/a-very-technical-look-at-bitmessage 15 comments
- Hashing Apples, Bananas and Cherries | Pascal Junod https://crypto.junod.info/posts/recursive-hash/ 10 comments
- GitHub - ofek/privy: An easy, fast lib to correctly password-protect your data https://github.com/ofek/privy 9 comments
- Signal >> Blog >> Simplifying OTR deniability. https://whispersystems.org/blog/simplifying-otr-deniability/ 8 comments
- What on Earth is this Encryption Scheme? || fabian writes. https://capnfabs.net/posts/wtf-encryption-scheme-synology-diskstation-nas/ 7 comments
- Surveying Pretty Good Privacy After Three Decades - ExceptionFactory https://exceptionfactory.com/posts/2021/08/16/surveying-pretty-good-privacy-after-three-decades/ 3 comments
- Honey Encrypted Password Managers - by Stian Kristoffersen https://stiankri.substack.com/p/honey-encrypted-password-managers 3 comments
- How to Process Passwords as a Software Developer - DEV Community https://dev.to/nathilia_pierce/how-to-process-passwords-as-a-software-developer-3dkh 2 comments
- Implementing an SSH agent in Hare https://drewdevault.com/2022/05/09/hare-ssh.html 1 comment
- How LinkedIn Could Have Secured Hacked Passwords https://www.stormpath.com/blog/how-linkedin-could-have-secured-hacked-passwords 1 comment
- A good open source password manager? Inconceivable! with Buttercup co-creator, Perry Mitchell (The Changelog #325) |> Changelog https://changelog.com/podcast/325 1 comment
- GitHub - rmind/rvault: rvault: secure and authenticated store for secrets and small documents https://github.com/rmind/rvault 1 comment
- User Sign-up Flow - by Josh - Dev Blueprints https://devblueprints.substack.com/p/user-sign-up-flow 1 comment
Would you like to stay up to date with Computer science? Checkout Computer science
Weekly.
Related searches:
Search whole site: site:en.wikipedia.org
Search title: Key derivation function - Wikipedia
See how to search.