List of PBKDF2 implementations

List of software that implements or uses the PBKDF2 key derivation standard.

Implementations

Systems that use PBKDF2

Disk encryption software

gollark: And that international shipping is really annoying, especially now, especially² for devices with batteries?
gollark: You realize Gibson is in the UK, and you are *not* there?
gollark: Oh neat, HP G8 servers are actually affordable now.
gollark: The RK3588 is actually performance-competitive with my server according to available benchmarks, which is *extremely*.
gollark: I intend to eventually replace it with an RK3588 board, if I can keep the drives hooked up somehow.

References

  1. "Windows Data Protection". NAI Labs, Network Associates, Inc.; Microsoft Corporation. October 2001. Archived from the original on 2007-04-16.
  2. "AES Coding Tips for Developers". WinZip. 2008-07-21. Retrieved 2013-09-07.
  3. "BRG Main SIte". Winzip.com. Retrieved 2013-09-07.
  4. Black, Crystal (2015-03-10). "Keeper: A Fresh Look At Password Management And Data Security". Techaeris. Retrieved 2015-04-16.
  5. "Security". LastPass: How We Do It. LastPass. Retrieved 2013-06-13.
  6. "LastPass Security Notification". LastPass. 2011-05-04. Archived from the original on 2012-05-19. Retrieved 2013-06-13.
  7. "Defending against crackers, PBKDF2". Agilebits, Inc. 2014. Retrieved 2014-11-14.
  8. "Enpass Security Whitepaper, PBKDF2". Sinew Software Systems Pvt Ltd. 2018. Retrieved 2018-12-05.
  9. "Our security model in a nutshell". Dashlane, Inc. 2014. Retrieved 2014-03-09.
  10. "Protection of User Data in Dashlane" (PDF). Dashlane Security Whitepaper. Dashlane, Inc. November 2011. Retrieved 2014-03-09.
  11. "What encryption is being used? | Bitwarden Help & Support". help.bitwarden.com. Retrieved 2019-09-21.
  12. "How does Standard Notes secure my notes?". standardnotes.org. Retrieved 2020-01-07.
  13. iOS security Archived 2012-10-21 at the Wayback Machine, May 2012, Apple inc.
  14. "How Django stores passwords". Django 1.4 documentation. 2012-03-23. Retrieved 31 July 2012.
  15. Odoo Security
  16. Encrypt/decrypt using block ciphers, Programmer’s Reference Guide of Zend Framework 2.
  17. Worldwide. "Cisco Security Response: Cisco IOS and Cisco IOS XE Type 4 Passwords Issue". Tools.cisco.com. Retrieved 2013-09-07.
  18. Dan Callahan (2014-04-30). "Firefox Sync's New Security Model". Mozilla Cloud Services. Mozilla. Retrieved 2015-07-16.
  19. Notes on the implementation of encryption in Android 3.0 Archived 2013-05-22 at the Wayback Machine, September 2012, Android Open Source Project.
  20. https://events.ccc.de/congress/2006/Fahrplan/attachments/1244-23C3VileFault.pdf
  21. "Header Key Derivation, Salt, and Iteration Count". TrueCrypt User’s Guide. TrueCrypt Foundation. 2012-02-07. Retrieved 2013-06-08.
  22. "Header Key Derivation, Salt, and Iteration Count". VeraCrypt Documentation. IDRIX. Retrieved 2017-10-16.
  23. "CipherShed User's Guide, Technical Details" (PDF). CipherShed User’s Guide. CipherShed Project. 2014-12-19. Retrieved 2014-12-27.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.