Author:
Bai Wenjie,Blocki Jeremiah
Publisher
Springer Berlin Heidelberg
Reference35 articles.
1. Biteopt algorithm. https://github.com/avaneev/biteopt
2. Allodi, L.: Economic factors of vulnerability trade and exploitation. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) ACM CCS 2017, Dallas, TX, USA, pp. 1483–1499. ACM Press, 31 October–2 November 2017. https://doi.org/10.1145/3133956.3133960
3. Alwen, J., Blocki, J., Harsha, B.: Practical graphs for optimal side-channel resistant memory-hard functions. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) ACM CCS 2017, Dallas, TX, USA, pp. 1001–1017. ACM Press, 31 October–2 November 2017. https://doi.org/10.1145/3133956.3134031
4. Bai, W., Blocki, J.: Dahash: Distribution aware tuning of password hashing costs (2021). https://arxiv.org/abs/2101.10374
5. Biryukov, A., Dinu, D., Khovratovich, D.: Argon2: new generation of memory-hard functions for password hashing and other applications. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 292–302. IEEE (2016)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献