Search

Your search keyword '"Rainbow table"' showing total 264 results

Search Constraints

Start Over You searched for: Descriptor "Rainbow table" Remove constraint Descriptor: "Rainbow table"
264 results on '"Rainbow table"'

Search Results

2. Precomputation for Rainbow Tables has Never Been so Fast

4. Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations.

5. An Approach to Defense Dictionary Attack with Message Digest Using Image Salt

6. New Technologies in Password Cracking Techniques

9. Optimization of Rainbow Tables for Practically Cracking GSM A5/1 Based on Validated Success Rate Modeling

12. Analysis of the Non-perfect Table Fuzzy Rainbow Tradeoff

14. How to Break EAP-MD5

15. Analysis of the Parallel Distinguished Point Tradeoff

16. Security

18. Add "Salt" MD5 Algorithm’s FPGA Implementation.

20. Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs

21. Time-Memory Trade-Off Attack on FPGA Platforms: UNIX Password Cracking

22. Application of LFSRs in Time/Memory Trade-Off Cryptanalysis

23. A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document

24. Cryptography: A Quantitative Analysis of the Effectiveness of Various Password Storage Techniques

25. Precomputation for Rainbow Tables has Never Been so Fast

26. Comparison of perfect table cryptanalytic tradeoff algorithms.

27. Authentication by Encrypted Negative Password

28. AirCollect - efficiently recovering hashed phone numbers leaked via Apple AirDrop

29. Fast Decryption of Excel Document Encrypted by RC4 Algorithm

30. An Experimental Evaluation on the Dependency between One-Way Hash Functions and Salt

31. New Approach in the Rainbow Tables Method for Human-Like Passwords

32. Add 'Salt' MD5 Algorithm’s FPGA Implementation

33. A Comparison of Cryptanalytic Tradeoff Algorithms.

34. Adivinando passwords. Una propuesta para su búsqueda eficiente

35. Tradeoff tables for compression functions: how to invert hash values.

36. The cost of false alarms in Hellman and rainbow tradeoffs.

39. A novel secure and efficient hash function with extra padding against rainbow table attacks

40. Analysis of the use of Rainbow Tables to break hash

41. An Improved Rainbow Table Attack for Long Passwords

42. Implementation of high speed rainbow table generation using Keccak hashing algorithm on GPU

43. Cryptanalysis on the Head and Tail Technique for Hashing Passwords

44. New Encryption Method with Adaptable Computational and Memory Complexity Using Selected Hash Function

45. An Approach to Defense Dictionary Attack with Message Digest Using Image Salt

46. The Function-Inversion Problem: Barriers and Opportunities

47. Adivinando passwords. Una propuesta para su búsqueda eficiente

48. Grid Authentication: A Memorability and User Sentiment Study

49. Cued-Click Point Graphical Password Using Circular Tolerance to Increase Password Space and Persuasive Features

50. Towards Improving Storage Cost and Security Features of Honeyword Based Approaches

Catalog

Books, media, physical & digital resources