Login / Signup
Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes.
Donghoon Chang
Arpan Jati
Sweta Mishra
Somitra Kumar Sanadhya
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
hash table
trade off
graphical password
information security
computational complexity
memory requirements
hash functions
random projections
file organization
computing power
memory size
hashing algorithm
neural network
memory management
limited memory
memory space
brute force
main memory
similarity search