|
You are here |
www.latacora.com | ||
| | | | |
qsantos.fr
|
|
| | | | | [AI summary] The article discusses the security implications of client-side password hashing, arguing that it can be secure when combined with memory-hard functions and proper implementation. | |
| | | | |
soatok.blog
|
|
| | | | | Programmers don't understand hash functions, and I can demonstrate this to most of the people that will read this with a single observation: When you saw the words "hash function" in the title, you might have assumed this was going to be a blog post about password storage. (Passwords are the most common knee-jerk reaction... | |
| | | | |
neilmadden.blog
|
|
| | | | | There has been a lot of discussion recently around the LastPass breach, especially with regards to the number of PBKDF2 iterations applied to the master password to derive the vault encryption key. Other people have already dissected this particular breach, but I want to more generally talk about PBKDF2 iterations and security models. (I'm not... | |
| | | | |
www.integralist.co.uk
|
|
| | | |||