lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAK9dnSy+RD1Qu3OoCCqY64fFiXvCA89JatAyXY_+iK1r6itZkw@mail.gmail.com>
Date: Mon, 12 Aug 2013 17:57:19 +0200
From: CodesInChaos <codesinchaos@...il.com>
To: discussions@...sword-hashing.net
Subject: Re: [PHC] The EARWORM password hash
With memory hard schemes like scrypt it's easy to put a lower bound on the
cost specialized hardware incurs per password guess.
With bandwidth based schemes this isn't so obvious. Are there any papers
analyzing this cost?
Content of type "text/html" skipped