Key stretching (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Key stretching" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
2nd place
2nd place
120th place
125th place
3rd place
3rd place
5,469th place
3,758th place
214th place
176th place
low place
low place
low place
low place
383rd place
320th place
5,739th place
4,857th place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place

7-zip.org

akkadia.org

bell-labs.com

cm.bell-labs.com

books.google.com

bsdcan.org

doi.org

  • Kelsey, John; Schneier, Bruce; Hall, Chris; Wagner, David A. (1997). "Secure Applications of Low-Entropy Keys". In Okamoto, Eiji; Davida, George I.; Mambo, Masahiro (eds.). Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings. Lecture Notes in Computer Science. Vol. 1396. Springer. pp. 121–134. doi:10.1007/BFb0030415. ISBN 978-3-540-64382-1.
  • Grassi Paul A. (June 2017). SP 800-63B-3 – Digital Identity Guidelines, Authentication and Lifecycle Management. NIST. doi:10.6028/NIST.SP.800-63b.
  • Meltem Sönmez Turan, Elaine Barker, William Burr, and Lily Chen (December 2010). SP 800-132 – Recommendation for Password-Based Key Derivation, Part 1: Storage Applications. NIST. doi:10.6028/NIST.SP.800-132.{{cite book}}: CS1 maint: multiple names: authors list (link)

freebsd.org

github.com

gist.github.com

ietf.org

tools.ietf.org

keepass.info

keepassxc.org

password-hashing.net

researchgate.net

tugraz.at

events.iaik.tugraz.at

web.archive.org

xilinx.com