List of PBKDF2 implementations

List of software that implements or uses the PBKDF2 key derivation standard.

Implementations

Systems that use PBKDF2

Disk encryption software

References

  1. "Windows Data Protection". NAI Labs, Network Associates, Inc.; Microsoft Corporation. October 2001. Archived from the original on 2007-04-16.
  2. "AES Coding Tips for Developers". WinZip. 2008-07-21. Retrieved 2013-09-07.
  3. "BRG Main SIte". Winzip.com. Retrieved 2013-09-07.
  4. Black, Crystal (2015-03-10). "Keeper: A Fresh Look At Password Management And Data Security". Techaeris. Retrieved 2015-04-16.
  5. "Security". LastPass: How We Do It. LastPass. Retrieved 2013-06-13.
  6. "LastPass Security Notification". LastPass. 2011-05-04. Archived from the original on 2012-05-19. Retrieved 2013-06-13.
  7. "Defending against crackers, PBKDF2". Agilebits, Inc. 2014. Retrieved 2014-11-14.
  8. "Enpass Security Whitepaper, PBKDF2". Sinew Software Systems Pvt Ltd. 2018. Retrieved 2018-12-05.
  9. "Our security model in a nutshell". Dashlane, Inc. 2014. Retrieved 2014-03-09.
  10. "Protection of User Data in Dashlane" (PDF). Dashlane Security Whitepaper. Dashlane, Inc. November 2011. Retrieved 2014-03-09.
  11. "What encryption is being used? | Bitwarden Help & Support". help.bitwarden.com. Retrieved 2019-09-21.
  12. "How does Standard Notes secure my notes?". standardnotes.org. Retrieved 2020-01-07.
  13. iOS security Archived 2012-10-21 at the Wayback Machine, May 2012, Apple inc.
  14. "How Django stores passwords". Django 1.4 documentation. 2012-03-23. Retrieved 31 July 2012.
  15. Odoo Security
  16. Encrypt/decrypt using block ciphers, Programmer’s Reference Guide of Zend Framework 2.
  17. Worldwide. "Cisco Security Response: Cisco IOS and Cisco IOS XE Type 4 Passwords Issue". Tools.cisco.com. Retrieved 2013-09-07.
  18. Dan Callahan (2014-04-30). "Firefox Sync's New Security Model". Mozilla Cloud Services. Mozilla. Retrieved 2015-07-16.
  19. Notes on the implementation of encryption in Android 3.0 Archived 2013-05-22 at the Wayback Machine, September 2012, Android Open Source Project.
  20. https://events.ccc.de/congress/2006/Fahrplan/attachments/1244-23C3VileFault.pdf
  21. "Header Key Derivation, Salt, and Iteration Count". TrueCrypt User’s Guide. TrueCrypt Foundation. 2012-02-07. Retrieved 2013-06-08.
  22. "Header Key Derivation, Salt, and Iteration Count". VeraCrypt Documentation. IDRIX. Retrieved 2017-10-16.
  23. "CipherShed User's Guide, Technical Details" (PDF). CipherShed User’s Guide. CipherShed Project. 2014-12-19. Retrieved 2014-12-27.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.