John the Ripper

Results: 55



#Item
21Openwall Project / Password / John the Ripper / Crack / Software / System software / Computer security

Automatic mangling rules generation Simon Marechal (bartavelle at openwall.com) http://www.openwall.com @Openwall December 2012

Add to Reading List

Source URL: www.openwall.com

Language: English - Date: 2012-12-06 13:03:31
22Cryptographic software / System software / Instruction set architectures / Password / Crypt / John the Ripper / ARM architecture / Central processing unit / Field-programmable gate array / Software / Computer architecture / Bcrypt

Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware Katja Malvoni (kmalvoni at openwall.com)

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2014-11-11 15:42:08
23Electronics / Bcrypt / Cryptographic software / Computer architecture / Crypt / Multi-core processor / John the Ripper / Brute-force attack / Field-programmable gate array / Cryptography / Computing / GPGPU

Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware Katja Malvoni University of Zagreb, Croatia

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-05-03 17:37:18
24Password strength / Password / Randomness / John the Ripper / Entropy / Password policy / OTPW / Cryptography / Security / Computer security

Of Passwords and People: Measuring the Effect of Password-Composition Policies

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2011-06-21 16:20:55
25Cryptography / Password / Crypt / John the Ripper / Password policy / Cognitive password / Computer security / Security / Access control

Does My Password Go up to Eleven? The Impact of Password Meters on Password Selection Serge Egelman1 , Andreas Sotirakopoulos2 , Ildar Muslukhov2 , Konstantin Beznosov2 , and Cormac Herley3 1 2

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2013-04-29 12:12:39
26Password / Crypt / John the Ripper / Phishing / Privileged password management / OTPW / Security / Computer security / Cryptography

Improving Text Passwords Through Persuasion Alain Forget1,2 , Sonia Chiasson1,2 , P.C. van Oorschot1 , Robert Biddle2 1 School of Computer Science & 2 Human Oriented Technology Lab Carleton University, Ottawa, Canada

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2010-02-10 11:41:36
27Password / Crack / John the Ripper / Crypt / Cryptography / Password cracking / Password strength / Software / System software / Computer security

DESIGNING AND CRACKING ASSOCIATIVE PASSWORDS KIRSI HELKALA ASSOCIATE PROFESSOR GJØVIK UNIVERSITY COLLEGE

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-04 17:14:18
28Password / Key management / John the Ripper / Crypt / Key derivation function / Brute-force attack / OTPW / Shadow password / Cryptography / Security / Computer security

Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Trent Jaeger Systems and Internet Infrastructure Securit

Add to Reading List

Source URL: www.enck.org

Language: English
29Cyberwarfare / Password / Computer crimes / Passphrase / John the Ripper / Phishing / Crypt / Password policy / Cognitive password / Computer security / Security / Cryptography

Text Entry Method Affects Password Security Yulong Yang† , Janne Lindqvist† , Antti Oulasvirta‡ † Rutgers University, ‡ Aalto University Abstract Background. Text-based passwords continue to be the

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-21 23:17:08
30Password / Randomness / John the Ripper / Entropy / Dictionary attack / OTPW / Random password generator / Cryptography / Security / Computer security

Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Rich Shay, Tim Vidas Lujo Bauer, Nicolas Christin, Lo

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-07-19 22:39:30
UPDATE