{"id":"https://openalex.org/W4392292139","doi":"https://doi.org/10.3389/fcomp.2024.1368362","title":"On time-memory trade-offs for password hashing schemes","display_name":"On time-memory trade-offs for password hashing schemes","publication_year":2024,"publication_date":"2024-02-29","ids":{"openalex":"https://openalex.org/W4392292139","doi":"https://doi.org/10.3389/fcomp.2024.1368362"},"language":"en","primary_location":{"id":"doi:10.3389/fcomp.2024.1368362","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2024.1368362","pdf_url":"https://www.frontiersin.org/articles/10.3389/fcomp.2024.1368362/pdf?isPublishedV2=False","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.frontiersin.org/articles/10.3389/fcomp.2024.1368362/pdf?isPublishedV2=False","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059957070","display_name":"Ay\u015fe Nurdan Saran","orcid":null},"institutions":[{"id":"https://openalex.org/I106245021","display_name":"\u00c7ankaya University","ror":"https://ror.org/056wqre19","country_code":"TR","type":"education","lineage":["https://openalex.org/I106245021"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Ayse Nurdan Saran","raw_affiliation_strings":["Department of Computer Engineering, \u00c7ankaya University, Ankara, T\u00fcrkiye"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, \u00c7ankaya University, Ankara, T\u00fcrkiye","institution_ids":["https://openalex.org/I106245021"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5059957070"],"corresponding_institution_ids":["https://openalex.org/I106245021"],"apc_list":{"value":1150,"currency":"USD","value_usd":1150},"apc_paid":{"value":1150,"currency":"USD","value_usd":1150},"fwci":3.2474,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.92305167,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"6","issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6712713241577148},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6652113199234009},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5285550355911255},{"id":"https://openalex.org/keywords/password-cracking","display_name":"Password cracking","score":0.4399430751800537},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.38533854484558105},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3437904119491577},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.31461477279663086},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.2742760181427002}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6712713241577148},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6652113199234009},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5285550355911255},{"id":"https://openalex.org/C3847113","wikidata":"https://www.wikidata.org/wiki/Q2746524","display_name":"Password cracking","level":5,"score":0.4399430751800537},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.38533854484558105},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3437904119491577},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31461477279663086},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.2742760181427002}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3389/fcomp.2024.1368362","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2024.1368362","pdf_url":"https://www.frontiersin.org/articles/10.3389/fcomp.2024.1368362/pdf?isPublishedV2=False","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:1f09f2d260ff4472bba8529188e0d2d1","is_oa":true,"landing_page_url":"https://doaj.org/article/1f09f2d260ff4472bba8529188e0d2d1","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Frontiers in Computer Science, Vol 6 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3389/fcomp.2024.1368362","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2024.1368362","pdf_url":"https://www.frontiersin.org/articles/10.3389/fcomp.2024.1368362/pdf?isPublishedV2=False","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6000000238418579}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4392292139.pdf"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W1495318773","https://openalex.org/W1535402424","https://openalex.org/W1549671385","https://openalex.org/W1554090281","https://openalex.org/W1561797008","https://openalex.org/W1565205193","https://openalex.org/W1877381484","https://openalex.org/W1916906602","https://openalex.org/W1923545420","https://openalex.org/W1994591449","https://openalex.org/W2006824395","https://openalex.org/W2012646342","https://openalex.org/W2054626033","https://openalex.org/W2055621644","https://openalex.org/W2079145130","https://openalex.org/W2101984821","https://openalex.org/W2130943734","https://openalex.org/W2135359429","https://openalex.org/W2171222077","https://openalex.org/W2295246365","https://openalex.org/W2354711464","https://openalex.org/W2396193826","https://openalex.org/W2399353113","https://openalex.org/W2503779953","https://openalex.org/W2552182158","https://openalex.org/W2799489955","https://openalex.org/W2811066956","https://openalex.org/W2935359245","https://openalex.org/W3196416974","https://openalex.org/W4214704132","https://openalex.org/W4289038676","https://openalex.org/W4383221491","https://openalex.org/W4385654448","https://openalex.org/W6631952876","https://openalex.org/W6637196019","https://openalex.org/W6637283249","https://openalex.org/W6683593295","https://openalex.org/W6685249190","https://openalex.org/W6724803331","https://openalex.org/W6749507292","https://openalex.org/W6796743228","https://openalex.org/W6802600049"],"related_works":["https://openalex.org/W2989690789","https://openalex.org/W3088784215","https://openalex.org/W2021087413","https://openalex.org/W2400890210","https://openalex.org/W4381744352","https://openalex.org/W2184803487","https://openalex.org/W2949495265","https://openalex.org/W2054626033","https://openalex.org/W2953105088","https://openalex.org/W3110679839"],"abstract_inverted_index":{"A":[0],"password":[1,35,64,97,113],"hashing":[2,36,65,98,114],"algorithm":[3],"is":[4,18,37,150],"a":[5,12,56,60,72,79,103,136],"cryptographic":[6,162],"method":[7],"that":[8],"transforms":[9],"passwords":[10,51],"into":[11],"secure":[13],"and":[14,88,109,126,139,156,170],"irreversible":[15],"format.":[16],"It":[17],"used":[19],"not":[20],"only":[21],"for":[22,27,115,128],"authentication":[23,116],"purposes":[24],"but":[25],"also":[26],"key":[28,61],"derivation":[29,62],"mechanisms.":[30],"The":[31,121,145],"primary":[32],"purpose":[33,146],"of":[34,42,49,55,90,106,135,147],"to":[38,67,142,151,154,160,166],"enhance":[39],"the":[40,47,53,86,119,133],"security":[41,168],"user":[43],"credentials":[44],"by":[45,117],"preventing":[46],"exposure":[48],"plaintext":[50],"in":[52,164],"event":[54],"data":[57],"breach.":[58],"As":[59],"function,":[63],"aims":[66],"derive":[68],"secret":[69],"keys":[70],"from":[71],"master":[73],"key,":[74],"password,":[75],"or":[76],"passphrase":[77],"using":[78],"pseudorandom":[80],"function.":[81],"This":[82,100],"review":[83,101],"focuses":[84],"on":[85,95,112,158],"design":[87],"analysis":[89],"time-memory":[91],"trade-off":[92],"(TMTO)":[93],"attacks":[94,108],"recent":[96,110],"algorithms.":[99],"presents":[102],"comprehensive":[104],"survey":[105],"TMTO":[107],"studies":[111],"examining":[118],"literature.":[120],"study":[122],"provides":[123],"valuable":[124],"insights":[125],"strategies":[127],"safely":[129],"navigating":[130],"transitions,":[131],"emphasizing":[132],"importance":[134],"systematic":[137],"approach":[138],"thorough":[140],"testing":[141],"mitigate":[143],"risk.":[144],"this":[148],"paper":[149],"provide":[152],"guidance":[153],"developers":[155],"administrators":[157],"how":[159],"update":[161],"practices":[163],"response":[165],"evolving":[167],"standards":[169],"threats.":[171]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
