<--- Back to Details
First PageDocument Content
Password / John the Ripper / Passphrase / Dictionary attack / Key derivation function / Crypt / Crack / Part-of-speech tagging / Password manager / Cryptography / Computer security / Security
Date: 2012-12-19 23:22:32
Password
John the Ripper
Passphrase
Dictionary attack
Key derivation function
Crypt
Crack
Part-of-speech tagging
Password manager
Cryptography
Computer security
Security

C:/Users/User/Dropbox/ResearchOld/passsphrase/CodaspyCameraReady/codasp040s-rao.dvi

Add to Reading List

Source URL: www.cs.cmu.edu

Download Document from Source Website

File Size: 416,48 KB

Share Document on Facebook

Similar Documents

Cryptography / Computer access control / Computer security / Password / Security / Brute-force attack / Hashcat / John the Ripper / Crypt / Guessing / Security hacker / Password fatigue

Measuring Real-World Accuracies and Biases in Modeling Password Guessability Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek† , Willi

DocID: 1la8e - View Document

Grid Implemented John the Ripper aka GI John Bucsay Balázs

DocID: 1dkE7 - View Document

http://www.petur.euJúní 2010 John the Ripper á UbuntuMPI Cluster

DocID: 1dfT8 - View Document

Parallelization of John the Ripper (JtR) using MPI Ryan Lim Computer Science and Engineering University of Nebraska–Lincoln Lincoln, NE

DocID: 1bFA1 - View Document

Parallelization of John the Ripper (JtR) using MPI Ryan Lim Computer Science and Engineering University of Nebraska–Lincoln Lincoln, NE

DocID: 1b4Ig - View Document