lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20170328080457.GA17372@openwall.com> Date: Tue, 28 Mar 2017 10:04:57 +0200 From: Solar Designer <solar@...nwall.com> To: discussions@...sword-hashing.net Subject: [PHC] yescrypt design rationale presentation Hi, I gave a talk at BSidesLjubljana earlier this month, and here are the slides (and link to video): http://www.openwall.com/presentations/BSidesLjubljana2017-Yescrypt-Large-scale-Password-Hashing/ Abstract: In this presentation, the problem of password hash cracking is framed as largely that of cost amortization, and thus the problem of password hashing as coming up with affordably costly and amortization-resistant password hashing schemes. In this context, rationale is given for both scrypt's sequential memory-hard hashing and yescrypt's numerous additions to it. Finally, application of yescrypt to mass user authentication is demonstrated. Alexander
Powered by blists - more mailing lists