Search

Your search keyword '"Rainbow table"' showing total 34 results

Search Constraints

Start Over You searched for: Descriptor "Rainbow table" Remove constraint Descriptor: "Rainbow table" Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
34 results on '"Rainbow table"'

Search Results

1. Analysis of the Non-perfect Table Fuzzy Rainbow Tradeoff

3. How to Break EAP-MD5

4. Analysis of the Parallel Distinguished Point Tradeoff

6. Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs

7. Time-Memory Trade-Off Attack on FPGA Platforms: UNIX Password Cracking

8. Application of LFSRs in Time/Memory Trade-Off Cryptanalysis

9. Research of Password Recovery Method for RAR Based on Parallel Random search

10. A Comparison of Time-Memory Trade-Off Attacks on Stream Ciphers

11. Analysis of the Non-perfect Table Fuzzy Rainbow Tradeoff

12. How to Break EAP-MD5

13. A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying’s Attack

14. Enhanced Dictionary Based Rainbow Table

15. Secure Hash-Based Password Authentication Protocol Using Smartcards

16. Analysis of the Parallel Distinguished Point Tradeoff

17. Virtual Expansion of Rainbow Tables

18. Cryptanalysis of Hash Functions Using Advanced Multiprocessing

19. One-Time Password System with Infinite Nested Hash Chains

20. Client-Server Password Recovery

21. Improving the Rainbow Attack by Reusing Colours

22. Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård

23. Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function

24. Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs

25. Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table

26. Improving Usability Through Password-Corrective Hashing

27. Time-Memory Trade-Off Attack on FPGA Platforms: UNIX Password Cracking

28. Application of LFSRs in Time/Memory Trade-Off Cryptanalysis

29. Proofs for Two-Server Password Authentication

30. Secure Password Pocket for Distributed Web Services

31. On Bit-Parallel Processing of Multi-byte Text

32. Design and Analysis of Password-Based Key Derivation Functions

33. Exploiting Traffic Localities for Efficient Flow State Lookup

34. EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange

Catalog

Books, media, physical & digital resources