Cryptanalytic time-memory trade-off for password hashing schemes.
Donghoon ChangArpan JatiSweta MishraSomitra Kumar SanadhyaPublished in: Int. J. Inf. Sec. (2019)
Keyphrases
- trade off
- memory usage
- hash table
- memory requirements
- memory space
- nearest neighbor search
- graphical password
- hash tables
- memory size
- computational power
- limited memory
- brute force
- hamming distance
- main memory
- linear hashing
- data structure
- neural network
- hashing algorithm
- user authentication
- random projections
- hash functions
- information security
- computationally expensive
- similarity measure