John the Ripper

Results: 55



#Item
51Randomness / Password / John the Ripper / Salt / Entropy / Crypt / MD5 / Password strength / Password policy / Cryptography / Computer security / Security

The science of guessing: analyzing an anonymized corpus of 70 million passwords Joseph Bonneau Computer Laboratory University of Cambridge [removed]

Add to Reading List

Source URL: www.jbonneau.com

Language: English - Date: 2014-05-03 16:10:03
52Password strength / Password / Salt / John the Ripper / Rainbow table / Passphrase / Crypt / OTPW / Random password generator / Cryptography / Security / Computer security

The Security of Modern Password Expiration: An Algorithmic Framework and Empirical Analysis Yinqian Zhang Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2010-07-30 10:55:54
53Identity management / Cryptographic software / Password manager / Password / Salt / Random password generator / John the Ripper / Crypt / Password strength / Security / Computer security / Cryptography

Kamouflage: Loss-Resistant Password Management Hristo Bojinov1 , Elie Bursztein1 , Xavier Boyen2 , and Dan Boneh1 1 2

Add to Reading List

Source URL: bojinov.org

Language: English - Date: 2010-06-30 01:55:11
54Rainbow table / Key management / Password / Dictionary attack / Salt / Key derivation function / Random password generator / Key space / John the Ripper / Cryptography / Espionage / Cryptographic hash functions

Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff Arvind Narayanan and Vitaly Shmatikov

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2005-09-13 00:37:50
55Espionage / Search algorithms / Hashing / Rainbow table / Password / John the Ripper / LM hash / Salt / Crypt / Cryptography / Cryptographic hash functions / Computer security

doi:[removed]j.diin[removed]

Add to Reading List

Source URL: dfrws.org

Language: English - Date: 2009-08-16 16:22:06
UPDATE