Search

Your search keyword '"Rainbow table"' showing total 99 results

Search Constraints

Start Over You searched for: Descriptor "Rainbow table" Remove constraint Descriptor: "Rainbow table" Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
99 results on '"Rainbow table"'

Search Results

2. Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations.

3. Precomputation for Rainbow Tables has Never Been so Fast

5. An Approach to Defense Dictionary Attack with Message Digest Using Image Salt

6. New Technologies in Password Cracking Techniques

9. Optimization of Rainbow Tables for Practically Cracking GSM A5/1 Based on Validated Success Rate Modeling

12. Add "Salt" MD5 Algorithm’s FPGA Implementation.

13. A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document

14. Cryptography: A Quantitative Analysis of the Effectiveness of Various Password Storage Techniques

15. Precomputation for Rainbow Tables has Never Been so Fast

16. Comparison of perfect table cryptanalytic tradeoff algorithms.

17. Authentication by Encrypted Negative Password

18. AirCollect - efficiently recovering hashed phone numbers leaked via Apple AirDrop

19. Fast Decryption of Excel Document Encrypted by RC4 Algorithm

20. An Experimental Evaluation on the Dependency between One-Way Hash Functions and Salt

21. New Approach in the Rainbow Tables Method for Human-Like Passwords

22. Implementation of high speed rainbow table generation using Keccak hashing algorithm on GPU

23. Cryptanalysis on the Head and Tail Technique for Hashing Passwords

24. Add 'Salt' MD5 Algorithm’s FPGA Implementation

25. Adivinando passwords. Una propuesta para su búsqueda eficiente

28. A novel secure and efficient hash function with extra padding against rainbow table attacks

29. Analysis of the use of Rainbow Tables to break hash

30. An Improved Rainbow Table Attack for Long Passwords

31. New Encryption Method with Adaptable Computational and Memory Complexity Using Selected Hash Function

32. An Approach to Defense Dictionary Attack with Message Digest Using Image Salt

33. The Function-Inversion Problem: Barriers and Opportunities

34. Adivinando passwords. Una propuesta para su búsqueda eficiente

35. Grid Authentication: A Memorability and User Sentiment Study

36. Cued-Click Point Graphical Password Using Circular Tolerance to Increase Password Space and Persuasive Features

37. Towards Improving Storage Cost and Security Features of Honeyword Based Approaches

38. Modern Network Security Practices: Using Rainbow Tables to Solve Organizational Issues

40. Pristine PixCaptcha as Graphical Password for Secure eBanking Using Gaussian Elimination and Cleaves Algorithm

41. The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs

42. Hashes and Passwords

43. Android User Enabled Security

44. New Technologies in Password Cracking Techniques

45. Analysis on the Security and Use of Password Managers

46. The Fuzzy Scheduling Algorithm for the Parallel Key Searching Problem on Cloud Environment

47. Optical image encryption using password key based on phase retrieval algorithm

48. Cracking More Password Hashes With Patterns

49. Comparison of perfect table cryptanalytic tradeoff algorithms

50. Efficient Accessing and Searching in a Sequence of Numbers

Catalog

Books, media, physical & digital resources