In general, a password algorithm, whatever its cost, … other settings. It should rely heavily on fast … Conversely, it should avoid operations like bit transposition … [It] should not lend itself to any kind of pipelined hardware … passwords with the same salt and hashing one …
Google-1
Google-2
Copyright clearance needed for quotation.