42:58 Rock Salt A Method for Securely Storing and Utilizing Password Validation Data All Hacking Cons
35:32 What we've learned with Two Secret Key Derivation Jeffrey Goldberg, Julie Haugh All Hacking Cons