Search results

Jump to navigation Jump to search
  • {{Short description|Password authentication algorithm}} ...s://tools.ietf.org/html/rfc6238|title=RFC 6238 – TOTP: Time-Based One-Time Password Algorithm|date=May 2011 |access-date=July 13, 2011|archive-date=July 11, 20 ...
    6 KB (759 words) - 22:49, 30 December 2024
  • ...rd without requiring a [[Public Key Infrastructure]]. It provides [[mutual authentication]] to the key exchange, a feature that is lacking in the [[Diffie–Hellman ke ...their shared (low-entropy) secret, which can be a password or a hash of a password (<math>s \neq 0</math>). The protocol executes in two rounds. ...
    10 KB (1,480 words) - 21:37, 26 February 2025
  • ...l=https://password-hashing.net/|title=Password Hashing Competition|website=password-hashing.net|access-date=2016-03-22}}</ref> which was won by [[Argon2]]. It ...S. L. M.|last4=Simplicio Jr|first4=Marcos A. |date=2014-01-04|title=Lyra: password-based key derivation with tunable memory and processing costs|journal=Journ ...
    18 KB (2,642 words) - 02:09, 24 December 2024
  • {{Short description|Password-based key derivation function}} ...me="provos">{{Cite conference |date=10 June 1999 |title=A Future-Adaptable Password Scheme |url=https://www.usenix.org/legacy/events/usenix99/provos/provos.pdf ...
    27 KB (3,896 words) - 05:14, 28 February 2025
  • ...[cryptographic primitive]]s, including [[cryptographic hash]]es, [[message authentication codes]], [[mask generation function]]s, [[stream cipher]]s, [[pseudo-random ...yption]] with associated data (AEAD),<ref name="Rivest2014"/> as well as [[password hashing]] schemes.<ref name="lyra2ToC">{{Cite conference|last=van Beirendon ...
    7 KB (988 words) - 02:38, 6 February 2025
  • ..., then the attacker only has an exponentially small chance of guessing the password <math>\alpha</math>, and so cannot distinguish the pair of programs from a * There are unobfuscatable, secure, deterministic [[message authentication]] schemes. ...
    7 KB (1,015 words) - 15:58, 14 October 2024
  • ...inst an encryption scheme that authenticates ciphertext (using a [[message authentication code]] or similar) before decrypting. ...Hiltgen |author3=Serge Vaudenay |author4=Martin Vuagnoux |date=2003 |title=Password Interception in a SSL/TLS Channel |url=https://www.iacr.org/cryptodb/archiv ...
    15 KB (2,151 words) - 11:18, 19 February 2025
  • ...The main site itself is accompanied by an open protocol for password-less authentication with Namecoin identities, a corresponding [[Free Software|free-software]] i ...
    17 KB (2,356 words) - 23:18, 24 May 2024
  • ...tokens were stolen from users that used a malicious online seed-creator, a password that protects their ownership of IOTA tokens.<ref name=":62" /> The seed-ge ...ansfers.<ref name=":10" /> A second layer protocol provides encryption and authentication of messages, or data streams, transmitted and stored on the Tangle as zero- ...
    48 KB (6,045 words) - 01:34, 19 February 2025
  • ..., [[Credit card chip|chip-based payment cards]], [[digital currencies]], [[password|computer passwords]], and [[military communications]].}} ...
    214 KB (29,880 words) - 09:50, 28 January 2025