Cryptanalytic time–memory trade-off for password hashing schemes
Crossref DOI link: https://doi.org/10.1007/s10207-018-0405-5
Published Online: 2018-04-17
Published Print: 2019-04
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Chang, Donghoon
Jati, Arpan
Mishra, Sweta http://orcid.org/0000-0003-1240-5841
Sanadhya, Somitra Kumar
Text and Data Mining valid from 2018-04-17
Article History
First Online: 17 April 2018