First Page | Document Content | |
---|---|---|
![]() Date: 2012-12-19 23:22:32Password John the Ripper Passphrase Dictionary attack Key derivation function Crypt Crack Part-of-speech tagging Password manager Cryptography Computer security Security | Add to Reading List |
![]() | Measuring Real-World Accuracies and Biases in Modeling Password Guessability Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek† , WilliDocID: 1la8e - View Document |
![]() | Grid Implemented John the Ripper aka GI John Bucsay Balázs
DocID: 1dkE7 - View Document |
![]() | http://www.petur.euJúní 2010 John the Ripper á UbuntuMPI ClusterDocID: 1dfT8 - View Document |
![]() | Parallelization of John the Ripper (JtR) using MPI Ryan Lim Computer Science and Engineering University of Nebraska–Lincoln Lincoln, NEDocID: 1bFA1 - View Document |
![]() | Parallelization of John the Ripper (JtR) using MPI Ryan Lim Computer Science and Engineering University of Nebraska–Lincoln Lincoln, NEDocID: 1b4Ig - View Document |