Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2. Visconti, A. & Gorla, F. IEEE Trans. Dependable Secur. Comput., 17(4):775–781, 2020. Paper doi bibtex @article{DBLP:journals/tdsc/ViscontiG20,
author = {Andrea Visconti and
Federico Gorla},
title = {Exploiting an {HMAC-SHA-1} Optimization to Speed up {PBKDF2}},
journal = {{IEEE} Trans. Dependable Secur. Comput.},
volume = {17},
number = {4},
pages = {775--781},
year = {2020},
url = {https://doi.org/10.1109/TDSC.2018.2878697},
doi = {10.1109/TDSC.2018.2878697},
timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tdsc/ViscontiG20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"9JF9syiiJgWLntRtd","bibbaseid":"visconti-gorla-exploitinganhmacsha1optimizationtospeeduppbkdf2-2020","authorIDs":[],"author_short":["Visconti, A.","Gorla, F."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Andrea"],"propositions":[],"lastnames":["Visconti"],"suffixes":[]},{"firstnames":["Federico"],"propositions":[],"lastnames":["Gorla"],"suffixes":[]}],"title":"Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2","journal":"IEEE Trans. Dependable Secur. Comput.","volume":"17","number":"4","pages":"775–781","year":"2020","url":"https://doi.org/10.1109/TDSC.2018.2878697","doi":"10.1109/TDSC.2018.2878697","timestamp":"Thu, 06 Aug 2020 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/tdsc/ViscontiG20.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/tdsc/ViscontiG20,\n author = {Andrea Visconti and\n Federico Gorla},\n title = {Exploiting an {HMAC-SHA-1} Optimization to Speed up {PBKDF2}},\n journal = {{IEEE} Trans. Dependable Secur. Comput.},\n volume = {17},\n number = {4},\n pages = {775--781},\n year = {2020},\n url = {https://doi.org/10.1109/TDSC.2018.2878697},\n doi = {10.1109/TDSC.2018.2878697},\n timestamp = {Thu, 06 Aug 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/tdsc/ViscontiG20.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Visconti, A.","Gorla, F."],"key":"DBLP:journals/tdsc/ViscontiG20","id":"DBLP:journals/tdsc/ViscontiG20","bibbaseid":"visconti-gorla-exploitinganhmacsha1optimizationtospeeduppbkdf2-2020","role":"author","urls":{"Paper":"https://doi.org/10.1109/TDSC.2018.2878697"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"http://dltgroup.dmi.unipg.it/temp_files/global.bib","creationDate":"2021-01-14T18:29:36.217Z","downloads":0,"keywords":[],"search_terms":["exploiting","hmac","sha","optimization","speed","pbkdf2","visconti","gorla"],"title":"Exploiting an HMAC-SHA-1 Optimization to Speed up PBKDF2","year":2020,"dataSources":["SjN5QvQnwzXZgxsKq","PCdRvyaDZRZMeqKhf"]}