Overview of the Candidates for the Password Hashing Competition - And their Resistance against Garbage-Collector Attacks.
Christian ForlerEik ListStefan LucksJakob WenzelPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- countermeasures
- information security
- data structure
- malicious attacks
- user authentication
- garbage collection
- file organization
- order preserving
- password guessing
- hash functions
- nearest neighbor search
- denial of service attacks
- traffic analysis
- hash tables
- information systems
- security threats
- watermarking algorithm
- security risks
- watermarking scheme
- video copy detection
- high dimensional
- chosen plaintext