Brute-force attack

Results: 59



#Item
11Real world AES key extraction  CHES-2010 Rump Session, Santa Barbara, USA, 19 August 2010 Real world AES key extraction Sergei Skorobogatov

Real world AES key extraction CHES-2010 Rump Session, Santa Barbara, USA, 19 August 2010 Real world AES key extraction Sergei Skorobogatov

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2010-09-09 06:37:08
12Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mc

Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mc

Add to Reading List

Source URL: nsrc.cse.psu.edu

Language: English - Date: 2015-04-16 15:07:31
13Flow-based Brute-force Attack Detection Martin Draˇsar, Jan Vykopal Masaryk University Institute of Computer Science Botanick´a 68a, Brno, Czech Republic Philipp Winter

Flow-based Brute-force Attack Detection Martin Draˇsar, Jan Vykopal Masaryk University Institute of Computer Science Botanick´a 68a, Brno, Czech Republic Philipp Winter

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2014-05-26 09:37:41
14DNSSEC Key Maintenance Analysis_final

DNSSEC Key Maintenance Analysis_final

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:09
15DNSSEC Key Maintenance Analysis_final

DNSSEC Key Maintenance Analysis_final

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:09
16Secure USB 3.0 Desktop Drive The world’s first PIN operated desktop hard drive with built-in hardware encryption and capacities of up to 6TB. Looking for the highest level of security for your data while utilising the

Secure USB 3.0 Desktop Drive The world’s first PIN operated desktop hard drive with built-in hardware encryption and capacities of up to 6TB. Looking for the highest level of security for your data while utilising the

Add to Reading List

Source URL: www.istorage-uk.com

Language: English - Date: 2014-09-08 11:16:19
17IOActive Security Advisory Title Severity Critical

IOActive Security Advisory Title Severity Critical

Add to Reading List

Source URL: www.ioactive.com

Language: English
18Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware Katja Malvoni  University of Zagreb, Croatia

Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware Katja Malvoni University of Zagreb, Croatia

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-05-03 17:37:18
19J. Cryptology: 255–293 DOI: s00145 © 2001 International Association for Cryptologic Research  Selecting Cryptographic Key Sizes

J. Cryptology: 255–293 DOI: s00145 © 2001 International Association for Cryptologic Research Selecting Cryptographic Key Sizes

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:16
20LNCSEnhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart

LNCSEnhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-11-28 11:08:41