Workshop on Elliptic Curve Cryptography Standards
June 11-12, 2015
Agenda now available!
The National Institute of Standards and Technology (NIST) will host a
Workshop on Elliptic Curve Cryptography Standards at NIST headquarters
in Gaithersburg, MD on June 11-12, 2015. The workshop will
coderman (at Saturday, May 9, 2015, 12:49:22 PM):
... use pseudorandom indexing to access the data, also based on the
password ... it is essential to the algorithm, and can not be
written in a side channel safe way.
even paired with a separate pseudo-random sequence?
both executed in
On 5/9/15, Krisztián Pintér pinte...@gmail.com wrote:
... create a huge block of pseudorandom data
derived from the password, and then use pseudorandom indexing to
access the data, also based on the password...
this second phase is what we are talking about here. it is essential
to the
coderman (at Saturday, May 9, 2015, 3:56:06 AM):
The reality is: bcrypt, scrypt, and most PHC finalists use password
dependent memory lookups, and thus are not cache-timing safe...
In typical scenarios, this does not matter. In some, it does.
has there been consideration of a processor