Return to Article Details Permutation-Based Hash Chains with Application to Password Hashing Download Download PDF