Check out the new USENIX Web site. next up previous
Next: Traditional crypt Up: Bcrypt Evaluation Previous: Bcrypt Evaluation


In the following, we give a brief overview of two password hashing functions in widespread use today, and state their main differences from bcrypt.


Niels Provos and David Mazieres