<--- Back to Details
First PageDocument Content
Espionage / Search algorithms / Hashing / Rainbow table / Password / John the Ripper / LM hash / Salt / Crypt / Cryptography / Cryptographic hash functions / Computer security
Date: 2009-08-16 16:22:06
Espionage
Search algorithms
Hashing
Rainbow table
Password
John the Ripper
LM hash
Salt
Crypt
Cryptography
Cryptographic hash functions
Computer security

doi:[removed]j.diin[removed]

Add to Reading List

Source URL: dfrws.org

Download Document from Source Website

File Size: 360,86 KB

Share Document on Facebook

Similar Documents

Cryptography / Computer access control / Computer security / Password / Security / Brute-force attack / Hashcat / John the Ripper / Crypt / Guessing / Security hacker / Password fatigue

Measuring Real-World Accuracies and Biases in Modeling Password Guessability Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek† , Willi

DocID: 1la8e - View Document

Grid Implemented John the Ripper aka GI John Bucsay Balázs

DocID: 1dkE7 - View Document

http://www.petur.euJúní 2010 John the Ripper á UbuntuMPI Cluster

DocID: 1dfT8 - View Document

Parallelization of John the Ripper (JtR) using MPI Ryan Lim Computer Science and Engineering University of Nebraska–Lincoln Lincoln, NE

DocID: 1bFA1 - View Document

Parallelization of John the Ripper (JtR) using MPI Ryan Lim Computer Science and Engineering University of Nebraska–Lincoln Lincoln, NE

DocID: 1b4Ig - View Document