Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks.
Christian ForlerEik ListStefan LucksJakob WenzelPublished in: PASSWORDS (2014)
Keyphrases
- countermeasures
- watermarking scheme
- data structure
- hash functions
- order preserving
- user authentication
- chosen plaintext
- terrorist attacks
- malicious attacks
- information security
- future trends
- security threats
- traffic analysis
- garbage collection
- file organization
- hamming distance
- linear hashing
- password guessing
- web applications
- nearest neighbor search
- random projections
- watermarking algorithm