Software:List of PBKDF2 implementations

From HandWiki
Short description: none

List of software that implements or uses the PBKDF2 key derivation standard.

Implementations

Systems that use PBKDF2

Disk encryption software

References

  1. "Authentication and authorisation in GRUB". https://www.gnu.org/software/grub/manual/grub/html_node/Authentication-and-authorisation.html#Authentication-and-authorisation. 
  2. "Windows Data Protection". NAI Labs, Network Associates, Inc.; Microsoft Corporation. October 2001. Archived from the original on 2007-04-16. https://web.archive.org/web/20070416014905/http://msdn2.microsoft.com/en-us/library/ms995355.aspx. 
  3. "AES Coding Tips for Developers". WinZip. 2008-07-21. http://www.winzip.com/aes_tips.htm. Retrieved 2013-09-07. 
  4. "BRG Main SIte". Winzip.com. http://www.winzip.com/gladman.cgi. Retrieved 2013-09-07. 
  5. Black, Crystal (2015-03-10). "Keeper: A Fresh Look At Password Management And Data Security". http://techaeris.com/2015/03/10/keeper-fresh-look-password-management-data-security/. Retrieved 2015-04-16. 
  6. "Security". LastPass: How We Do It. LastPass. http://lastpass.com/whylastpass_technology.php. Retrieved 2013-06-13. 
  7. "LastPass Security Notification". LastPass. 2011-05-04. Archived from the original on 2012-05-07. https://web.archive.org/web/20120507035926/http://blog.lastpass.com/2011/05/lastpass-security-notification.html. Retrieved 2013-06-13. 
  8. "Defending against crackers, PBKDF2". Agilebits, Inc. 2014. https://learn2.agilebits.com/1Password4/Security/PBKDF2-overview.html. Retrieved 2014-11-14. 
  9. "Enpass Security Whitepaper, PBKDF2". Sinew Software Systems Pvt Ltd.. 2018. https://www.enpass.io/docs/enpass-security-whitepaper/vault.html. Retrieved 2018-12-05. 
  10. "Our security model in a nutshell". Dashlane, Inc. 2014. https://www.dashlane.com/security. Retrieved 2014-03-09. 
  11. "Protection of User Data in Dashlane". Dashlane Security Whitepaper. Dashlane, Inc. November 2011. https://www.dashlane.com/download/Security-Whitepaper-Final-Nov-2011.pdf. Retrieved 2014-03-09. 
  12. "What encryption is being used? | Bitwarden Help & Support". https://help.bitwarden.com/article/what-encryption-is-used/. 
  13. "How does Standard Notes secure my notes?". https://standardnotes.com/help/3/how-does-standard-notes-secure-my-notes. 
  14. iOS security , May 2012, Apple inc.
  15. "How Django stores passwords". Django 1.4 documentation. 2012-03-23. http://docs.djangoproject.com/en/1.4/topics/auth/#how-django-stores-passwords. Retrieved 31 July 2012. 
  16. Odoo Security
  17. Encrypt/decrypt using block ciphers, Programmer’s Reference Guide of Zend Framework 2.
  18. Worldwide. "Cisco Security Response: Cisco IOS and Cisco IOS XE Type 4 Passwords Issue". Tools.cisco.com. http://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20130318-type4. Retrieved 2013-09-07. 
  19. Dan Callahan (2014-04-30). "Firefox Sync's New Security Model". Mozilla Cloud Services. Mozilla. https://blog.mozilla.org/services/2014/04/30/firefox-syncs-new-security-model/. Retrieved 2015-07-16. 
  20. Notes on the implementation of encryption in Android 3.0 , September 2012, Android Open Source Project.
  21. https://events.ccc.de/congress/2006/Fahrplan/attachments/1244-23C3VileFault.pdf [bare URL PDF]
  22. "Header Key Derivation, Salt, and Iteration Count". TrueCrypt User’s Guide. TrueCrypt Foundation. 2012-02-07. http://www.truecrypt.org/docs/?s=header-key-derivation. Retrieved 2013-06-08. 
  23. "Header Key Derivation, Salt, and Iteration Count". VeraCrypt Documentation. IDRIX. https://www.veracrypt.fr/en/Header%20Key%20Derivation.html. Retrieved 2017-10-16. 
  24. "CipherShed User's Guide, Technical Details". CipherShed User’s Guide. CipherShed Project. 2014-12-19. https://github.com/CipherShed/CipherShed/blob/v0.7.3.0-dev/doc/userdocs/guide/CipherShed-User-Guide-0.7.3.0.pdf. Retrieved 2014-12-27.