List of PBKDF2 implementations

List of software that implements or uses the PBKDF2 key derivation standard.

Implementations

Systems that use PBKDF2

Disk encryption software

References

  1. "Windows Data Protection". NAI Labs, Network Associates, Inc.; Microsoft Corporation. October 2001. Archived from the original on 2007-04-16.
  2. "AES Coding Tips for Developers". WinZip. 2008-07-21. Retrieved 2013-09-07.
  3. "BRG Main SIte". Winzip.com. Retrieved 2013-09-07.
  4. Black, Crystal (2015-03-10). "Keeper: A Fresh Look At Password Management And Data Security". Techaeris. Retrieved 2015-04-16.
  5. "Security". LastPass: How We Do It. LastPass. Retrieved 2013-06-13.
  6. "LastPass Security Notification". LastPass. 2011-05-04. Retrieved 2013-06-13.
  7. "Defending against crackers, PBKDF2". Agilebits, Inc. 2014. Retrieved 2014-11-14.
  8. "Our security model in a nutshell". Dashlane, Inc. 2014. Retrieved 2014-03-09.
  9. "Protection of User Data in Dashlane" (PDF). Dashlane Security Whitepaper. Dashlane, Inc. November 2011. Retrieved 2014-03-09.
  10. iOS security, May 2012, Apple inc.
  11. "How Django stores passwords". Django 1.4 documentation. 2012-03-23. Retrieved 31 July 2012.
  12. Encrypt/decrypt using block ciphers, Programmer’s Reference Guide of Zend Framework 2.
  13. Worldwide. "Cisco Security Response: Cisco IOS and Cisco IOS XE Type 4 Passwords Issue". Tools.cisco.com. Retrieved 2013-09-07.
  14. Dan Callahan (2014-04-30). "Firefox Sync's New Security Model". Mozilla Cloud Services. Mozilla. Retrieved 2015-07-16.
  15. Notes on the implementation of encryption in Android 3.0, September 2012, Android Open Source Project.
  16. https://events.ccc.de/congress/2006/Fahrplan/attachments/1244-23C3VileFault.pdf
  17. "Header Key Derivation, Salt, and Iteration Count". TrueCrypt User’s Guide. TrueCrypt Foundation. 2012-02-07. Retrieved 2013-06-08.
  18. "CipherShed User's Guide, Technical Details" (PDF). CipherShed User’s Guide. CipherShed Project. 2014-12-19. Retrieved 2014-12-27.
This article is issued from Wikipedia - version of the 8/30/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.