SlideShare a Scribd company logo
Improving password-based authentication
Improving

password-based
authentication
Frank Denis @jedisct1
Improving password-based authentication
What’s wrong with
passwords?
Improving password-based authentication
Passwords are reused: find one, pwn many.
Companies don’t always communicate
about a breach until they are forced to.
Which can have side effects if discovered
when you are negotiating an acquisition
by Verizon.
Breaches happen all the time, even big
corporations and banks cannot be trusted.
Improving password-based authentication
API keys are passwords, too.
Committed to public repositories.
Present on present and past employees
laptops.
Long-term, shared secrets.
Intentionally leaked by customers because
you asked them to!
Improving password-based authentication
OpenDNS

support

forum
Improving password-based authentication
Password!
https://support.opendns.com/hc/en-us/community/posts/220033527-OpenDNS-Blocking-never-set-it-up
Many more leaks happen due to bad design.

Ex: HTTP_REFERER
Improving password-based authentication
Face it: passwords are here to stay
Convenient, universal way to log in from
anywhere, on any device.
Today’s passwords might be less terrible

than 10 years ago.
This is something you know, not something

that you have. Stealing them requires a $5

wrench.
Improving password-based authentication
How to survive a
password breach
Improving password-based authentication
Database encryption
Useless against other threats we are going

to talk about soon.
Useless if the key is leaked.
Useless if passwords are leaked using a

post-decryption vulnerability.
Improving password-based authentication
Hashing
Gives a false sense of security
Deterministic

Can be broken by using Google.
Improving password-based authentication
Hashing with a salt
Defeats rainbow tables.
This is not enough.
Improving password-based authentication
Hashing with a salt
Every time a new breach is announced,
about 70% of the passwords were already
present in previous lists.
Lists of > 500 million passwords from
previous breaches can be freely
downloaded.
What about the remaining 30%?
Improving password-based authentication
Hashing with a salt
A personal cracking rig can run 100 billion
guesses per second.
An exhaustive search of all the possible 8
characters passwords can be performed by
a single rig in less than a day.
But wait… it gets worse…
Improving password-based authentication
Hashing with a salt
Password entropy is almost always
overestimated.
Improving password-based authentication
Hashing with a salt
Humans are bad at generating randomness.
Improving password-based authentication
Hashing with a salt
Modern password crackers use
permutations, substitutions, Markov chains,
and neural networks in order to efficiently
probe the key space.
Smart contracts can reward people for
cracking passwords.
Improving password-based authentication
CPU-hard hash functions
PBKDF2, bcrypt
Can be massively parallelized
A perfect fit for GPUs and ASICs
We’d like to minimize the advantage
attackers have over defenders.
Improving password-based authentication
Memory-hard hash functions
scrypt
Require a lot of memory: each iteration
requires data from previous iterations.
TMTO attacks.
Improving password-based authentication
2013-2015: password hashing competition
Winner: Argon2
For a given set of parameters, computing a
hash requires a fixed amount of silicon
(transistors, capacitors, routing).
Improving password-based authentication
2015-2019: Argon2 adoption
libsodium, libargon2
Now available for all programming
languages.
Quickly adopted by cryptocurrencies and

applications.
Not a good fit for JavaScript, though.
Improving password-based authentication
2019
We realized that some practical
requirements had been overlooked.
What we may need is cache-hard functions
instead of memory-hard functions.
Due to CPU caches, Argon2 is actually
worse than bcrypt for some parameters.
Improving password-based authentication
2019
Still, if you use any of the functions from the
previous slides, you’ll be in a far better
position than virtually everyone else in the
industry.
Yes, even with random parameters.
Improving password-based authentication
It could have been the
last slide, but…
Improving password-based authentication
Password hashing is an expensive
operation, done server-side.
Introduces a DoS vector.
Choosing optimal parameters is hard.
Improving password-based authentication
Client Server
password over TLS
Improving password-based authentication
Client Server
password over TLS
TLS termination
Improving password-based authentication
Client ServerEnterprise security gateway
SSL added and removed here!
Improving password-based authentication
Client ServerISP
Improving password-based authentication
Passwords can be found in application
logs, displayed on error pages.
Sent to 3rd party services (New Relic,
Datadog…)
Affected Facebook and Twitter.
Password hashing doesn’t do anything.
Improving password-based authentication
Insider threats. Cloud providers.
This is a stealth, passive attack.
Password hashing doesn’t do anything.
Running tcpdump on a production server
can be all it takes.
Improving password-based authentication
Passwords should not
be sent over a network
any more.
Improving password-based authentication
Public-key cryptography to the rescue
Passwordless SSH
Client certificates are widely supported by
web servers and browsers, but they’re
barely usable.
Private keys stay on the clients. Their public
counterparts being leaked is no big deal.
Improving password-based authentication
Deterministic keys from passwords
Derive keys from passwords; servers can
then use public keys for authentication.
h ← H(pwd)
(pk, sk) ← H2KP(h)
The client does the hard work (or a part of
it): no more DoS vector!
But this is deterministic; public keys can be
precomputed from password dictionaries.
Improving password-based authentication
h ← H(s, pwd)
(pk, sk) ← H2KP(h)
But how does the client get the salt?
Deterministic keys from passwords
Client ServerS(sk, n)
Client ServerV(pk, S(sk, n))
Client Servern
Improving password-based authentication
h ← H(s, pwd)
(pk, sk) ← H2KP(h)
Client Servern, s
Client ServerS(sk, n)
Client ServerV(pk, S(sk, n))
Client Servername
But wait…
Improving password-based authentication
Now, the salt is public
Not secure against targeted
precomputation
Improving password-based authentication
A B?
A B?
x
?f(x)
Oblivious transfer
Improving password-based authentication
A Bg(xr
)
A Bxr
(mod p)
x, r g
f(x) = g(xr
)1/r
(mod p)
(V)OPRFs
blind(x)
Improving password-based authentication
A Bg(xr
)
A Bxr
x, r k
f(x) = g(xr
)1/r
(V)OPRFs
g(x) = xk
blind(x)
random oracle for A
Improving password-based authentication
Client Serverg ∘ blind(s)
Client Serverblind(s)
OPAQUE blind salts
h′ ← H′(pwd)
s ← H2S(h′)
s′ ← g(s)
Improving password-based authentication
Client Serverg ∘ blind(s)
Client Serverblind(s)
OPAQUE blind salts
s′ ← g(s)
h ← H(s, pwd)
(pk, sk) ← H2KP(h)
h′ ← H′(pwd)
s ← H2S(h′)
Improving password-based authentication
Client Serverg ∘ blind(s), n
Client ServerS(sk, n)
Client ServerV(pk, S(sk, n))
Client Servername, blind(s)
A shared session key can also be
computed.
User enumeration can be prevented.
Improving password-based authentication
The server doesn’t know the salt.
Defeats precomputation.
Every attempt requires an interaction with
the server.
Knowing the salt requires knowing the
password.
Proof of concept implemented for
Terrarium.
Improving password-based authentication
PAKEs
Improving password-based authentication
PAKEs
Password-based authentication.
Use cases:
More generally: secure key exchange from

low-entropy secrets. Ex: Magic Wormhole, 

biometric authentication, pairing IoT devices,

QRCode-based pairing…
Bootstraping a PKI
Improving password-based authentication
The PAKE selection process
SRP and SCRAM can be improved.
Improving password-based authentication
Deployment
Requires tight coupling with operating

systems and web browsers.
Integration into TLS 1.3 is being considered.
May be a solid defense against phishing.
Browser vendors haven’t been involved yet.
Improving password-based authentication
Improving password-based authentication
Dependencies
Improving password-based authentication
Dependencies
Improving password-based authentication
Dependencies
Improving password-based authentication
Terrarium demo - Shows that PAKEs need

shared code between clients and servers, and
that WebAssembly can help with that.
SPAKE2+EE implementation for libsodium.
Now in libsodium 1.0.18 and wasm-crypto:

- hash-to-curve

- ristretto

- arithmetic to implement (V)OPRFs.
https://github.com/jedisct1/wasm-crypto https://sk.tl/66AuXfXS
Improving password-based authentication
Thanks!

More Related Content

What's hot

Java application monitoring with Dropwizard Metrics and graphite
Java application monitoring with Dropwizard Metrics and graphite Java application monitoring with Dropwizard Metrics and graphite
Java application monitoring with Dropwizard Metrics and graphite
Roberto Franchini
 
Module wise table relations
Module wise table relationsModule wise table relations
Module wise table relations
VenkatReddy236838
 
Hidden automation-the-power-of-gel-scripting
Hidden automation-the-power-of-gel-scriptingHidden automation-the-power-of-gel-scripting
Hidden automation-the-power-of-gel-scripting
Prashank Singh
 
VoltDB 소개
VoltDB 소개VoltDB 소개
VoltDB 소개
Linux Foundation Korea
 
Microsoft Dynamics CRM for Nonprofits
Microsoft Dynamics CRM for NonprofitsMicrosoft Dynamics CRM for Nonprofits
Microsoft Dynamics CRM for Nonprofits
sarahbar
 
Nityo pravam sap capability deck
Nityo pravam   sap capability deckNityo pravam   sap capability deck
Nityo pravam sap capability deck
Prasan (AKA) Jeff
 
Tableau Customer Presentation
Tableau Customer PresentationTableau Customer Presentation
Tableau Customer Presentation
Splunk
 
Deep Dive into the New Features of Apache Spark 3.1
Deep Dive into the New Features of Apache Spark 3.1Deep Dive into the New Features of Apache Spark 3.1
Deep Dive into the New Features of Apache Spark 3.1
Databricks
 
Logitech Rally Bar and Rally Bar Mini Video Conferencing Appliance (Overview)
Logitech Rally Bar and Rally Bar Mini Video Conferencing Appliance (Overview)Logitech Rally Bar and Rally Bar Mini Video Conferencing Appliance (Overview)
Logitech Rally Bar and Rally Bar Mini Video Conferencing Appliance (Overview)
VideoConferenceGear.com
 
SAP S4 HANA MM 1709 Overview (mindmap edition) Final
SAP S4 HANA MM 1709 Overview (mindmap edition) FinalSAP S4 HANA MM 1709 Overview (mindmap edition) Final
SAP S4 HANA MM 1709 Overview (mindmap edition) Final
Benedict Yong (杨腾翔)
 
Migration Approaches for FDMEE
Migration Approaches for FDMEEMigration Approaches for FDMEE
Migration Approaches for FDMEE
Alithya
 
SAP Table Logics
SAP Table LogicsSAP Table Logics
SAP Table Logics
guestf3438c
 

What's hot (12)

Java application monitoring with Dropwizard Metrics and graphite
Java application monitoring with Dropwizard Metrics and graphite Java application monitoring with Dropwizard Metrics and graphite
Java application monitoring with Dropwizard Metrics and graphite
 
Module wise table relations
Module wise table relationsModule wise table relations
Module wise table relations
 
Hidden automation-the-power-of-gel-scripting
Hidden automation-the-power-of-gel-scriptingHidden automation-the-power-of-gel-scripting
Hidden automation-the-power-of-gel-scripting
 
VoltDB 소개
VoltDB 소개VoltDB 소개
VoltDB 소개
 
Microsoft Dynamics CRM for Nonprofits
Microsoft Dynamics CRM for NonprofitsMicrosoft Dynamics CRM for Nonprofits
Microsoft Dynamics CRM for Nonprofits
 
Nityo pravam sap capability deck
Nityo pravam   sap capability deckNityo pravam   sap capability deck
Nityo pravam sap capability deck
 
Tableau Customer Presentation
Tableau Customer PresentationTableau Customer Presentation
Tableau Customer Presentation
 
Deep Dive into the New Features of Apache Spark 3.1
Deep Dive into the New Features of Apache Spark 3.1Deep Dive into the New Features of Apache Spark 3.1
Deep Dive into the New Features of Apache Spark 3.1
 
Logitech Rally Bar and Rally Bar Mini Video Conferencing Appliance (Overview)
Logitech Rally Bar and Rally Bar Mini Video Conferencing Appliance (Overview)Logitech Rally Bar and Rally Bar Mini Video Conferencing Appliance (Overview)
Logitech Rally Bar and Rally Bar Mini Video Conferencing Appliance (Overview)
 
SAP S4 HANA MM 1709 Overview (mindmap edition) Final
SAP S4 HANA MM 1709 Overview (mindmap edition) FinalSAP S4 HANA MM 1709 Overview (mindmap edition) Final
SAP S4 HANA MM 1709 Overview (mindmap edition) Final
 
Migration Approaches for FDMEE
Migration Approaches for FDMEEMigration Approaches for FDMEE
Migration Approaches for FDMEE
 
SAP Table Logics
SAP Table LogicsSAP Table Logics
SAP Table Logics
 

Similar to Improving password-based authentication

Secure Communication with an Insecure Internet Infrastructure
Secure Communication with an Insecure Internet InfrastructureSecure Communication with an Insecure Internet Infrastructure
Secure Communication with an Insecure Internet Infrastructure
webhostingguy
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
BU
 
Securing Network Access with Open Source solutions
Securing Network Access with Open Source solutionsSecuring Network Access with Open Source solutions
Securing Network Access with Open Source solutions
Nick Owen
 
TLS and Certificates
TLS and CertificatesTLS and Certificates
TLS and Certificates
Karri Huhtanen
 
"Crypto wallets security. For developers", Julia Potapenko
"Crypto wallets security. For developers", Julia Potapenko"Crypto wallets security. For developers", Julia Potapenko
"Crypto wallets security. For developers", Julia Potapenko
Fwdays
 
Raconte-moi X.509 : anatomie d'une autorité de certification
Raconte-moi X.509 : anatomie d'une autorité de certificationRaconte-moi X.509 : anatomie d'une autorité de certification
Raconte-moi X.509 : anatomie d'une autorité de certification
Jean-Christophe Sirot
 
Delivering Javascript to World+Dog
Delivering Javascript to World+DogDelivering Javascript to World+Dog
Delivering Javascript to World+Dog
Kyle Randolph
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecurities
amiable_indian
 
Best Practices of IoT in the Cloud
Best Practices of IoT in the CloudBest Practices of IoT in the Cloud
Best Practices of IoT in the Cloud
Amazon Web Services
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
Amazon Web Services
 
Defending Against Attacks With Rails
Defending Against Attacks With RailsDefending Against Attacks With Rails
Defending Against Attacks With Rails
Tony Amoyal
 
Believe It Or Not SSL Attacks
Believe It Or Not SSL AttacksBelieve It Or Not SSL Attacks
Believe It Or Not SSL Attacks
Akash Mahajan
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
Amazon Web Services
 
How to get along with HATEOAS without letting the bad guys steal your lunch?
How to get along with HATEOAS without letting the bad guys steal your lunch?How to get along with HATEOAS without letting the bad guys steal your lunch?
How to get along with HATEOAS without letting the bad guys steal your lunch?
Graham Charters
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)security
Enrico Zimuel
 
Seattle C* Meetup: Hardening cassandra for compliance or paranoia
Seattle C* Meetup: Hardening cassandra for compliance or paranoiaSeattle C* Meetup: Hardening cassandra for compliance or paranoia
Seattle C* Meetup: Hardening cassandra for compliance or paranoia
zznate
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
Paula Januszkiewicz
 
MITRE ATT&CKcon 2018: Playing Devil’s Advocate to Security Initiatives with A...
MITRE ATT&CKcon 2018: Playing Devil’s Advocate to Security Initiatives with A...MITRE ATT&CKcon 2018: Playing Devil’s Advocate to Security Initiatives with A...
MITRE ATT&CKcon 2018: Playing Devil’s Advocate to Security Initiatives with A...
MITRE - ATT&CKcon
 
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by DesignJon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
jonmccoy
 
BCS_PKI_part1.ppt
BCS_PKI_part1.pptBCS_PKI_part1.ppt
BCS_PKI_part1.ppt
UskuMusku1
 

Similar to Improving password-based authentication (20)

Secure Communication with an Insecure Internet Infrastructure
Secure Communication with an Insecure Internet InfrastructureSecure Communication with an Insecure Internet Infrastructure
Secure Communication with an Insecure Internet Infrastructure
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
Securing Network Access with Open Source solutions
Securing Network Access with Open Source solutionsSecuring Network Access with Open Source solutions
Securing Network Access with Open Source solutions
 
TLS and Certificates
TLS and CertificatesTLS and Certificates
TLS and Certificates
 
"Crypto wallets security. For developers", Julia Potapenko
"Crypto wallets security. For developers", Julia Potapenko"Crypto wallets security. For developers", Julia Potapenko
"Crypto wallets security. For developers", Julia Potapenko
 
Raconte-moi X.509 : anatomie d'une autorité de certification
Raconte-moi X.509 : anatomie d'une autorité de certificationRaconte-moi X.509 : anatomie d'une autorité de certification
Raconte-moi X.509 : anatomie d'une autorité de certification
 
Delivering Javascript to World+Dog
Delivering Javascript to World+DogDelivering Javascript to World+Dog
Delivering Javascript to World+Dog
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecurities
 
Best Practices of IoT in the Cloud
Best Practices of IoT in the CloudBest Practices of IoT in the Cloud
Best Practices of IoT in the Cloud
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
 
Defending Against Attacks With Rails
Defending Against Attacks With RailsDefending Against Attacks With Rails
Defending Against Attacks With Rails
 
Believe It Or Not SSL Attacks
Believe It Or Not SSL AttacksBelieve It Or Not SSL Attacks
Believe It Or Not SSL Attacks
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
 
How to get along with HATEOAS without letting the bad guys steal your lunch?
How to get along with HATEOAS without letting the bad guys steal your lunch?How to get along with HATEOAS without letting the bad guys steal your lunch?
How to get along with HATEOAS without letting the bad guys steal your lunch?
 
Password (in)security
Password (in)securityPassword (in)security
Password (in)security
 
Seattle C* Meetup: Hardening cassandra for compliance or paranoia
Seattle C* Meetup: Hardening cassandra for compliance or paranoiaSeattle C* Meetup: Hardening cassandra for compliance or paranoia
Seattle C* Meetup: Hardening cassandra for compliance or paranoia
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
 
MITRE ATT&CKcon 2018: Playing Devil’s Advocate to Security Initiatives with A...
MITRE ATT&CKcon 2018: Playing Devil’s Advocate to Security Initiatives with A...MITRE ATT&CKcon 2018: Playing Devil’s Advocate to Security Initiatives with A...
MITRE ATT&CKcon 2018: Playing Devil’s Advocate to Security Initiatives with A...
 
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by DesignJon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
 
BCS_PKI_part1.ppt
BCS_PKI_part1.pptBCS_PKI_part1.ppt
BCS_PKI_part1.ppt
 

More from Frank Denis

El Passo - Privacy-preserving single sign on
El Passo - Privacy-preserving single sign onEl Passo - Privacy-preserving single sign on
El Passo - Privacy-preserving single sign on
Frank Denis
 
This domain name will self-destruct tomorrow
This domain name will self-destruct tomorrowThis domain name will self-destruct tomorrow
This domain name will self-destruct tomorrow
Frank Denis
 
Malware vs Big Data
Malware vs Big DataMalware vs Big Data
Malware vs Big Data
Frank Denis
 
Abusing Javascript to speedup mobile web sites
Abusing Javascript to speedup mobile web sitesAbusing Javascript to speedup mobile web sites
Abusing Javascript to speedup mobile web sites
Frank Denis
 
An introduction to Pincaster
An introduction to PincasterAn introduction to Pincaster
An introduction to Pincaster
Frank Denis
 
Graphs
GraphsGraphs
Graphs
Frank Denis
 
Redis - (nosqlfr meetup #2)
Redis - (nosqlfr meetup #2) Redis - (nosqlfr meetup #2)
Redis - (nosqlfr meetup #2)
Frank Denis
 

More from Frank Denis (7)

El Passo - Privacy-preserving single sign on
El Passo - Privacy-preserving single sign onEl Passo - Privacy-preserving single sign on
El Passo - Privacy-preserving single sign on
 
This domain name will self-destruct tomorrow
This domain name will self-destruct tomorrowThis domain name will self-destruct tomorrow
This domain name will self-destruct tomorrow
 
Malware vs Big Data
Malware vs Big DataMalware vs Big Data
Malware vs Big Data
 
Abusing Javascript to speedup mobile web sites
Abusing Javascript to speedup mobile web sitesAbusing Javascript to speedup mobile web sites
Abusing Javascript to speedup mobile web sites
 
An introduction to Pincaster
An introduction to PincasterAn introduction to Pincaster
An introduction to Pincaster
 
Graphs
GraphsGraphs
Graphs
 
Redis - (nosqlfr meetup #2)
Redis - (nosqlfr meetup #2) Redis - (nosqlfr meetup #2)
Redis - (nosqlfr meetup #2)
 

Recently uploaded

Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
TaghreedAltamimi
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
riddhimaagrawal986
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
gaafergoudaay7aga
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 

Recently uploaded (20)

Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 

Improving password-based authentication