Rainbow table

Results: 83



#Item
71Password strength / Password / Salt / John the Ripper / Rainbow table / Passphrase / Crypt / OTPW / Random password generator / Cryptography / Security / Computer security

The Security of Modern Password Expiration: An Algorithmic Framework and Empirical Analysis Yinqian Zhang Fabian Monrose

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2010-07-30 10:55:54
72Password / Rainbow table / Portable Document Format / Dictionary attack / Crypt / Adobe Acrobat / Password manager / Password strength / Software / Computing / Cryptography

Unlocking PDF guaranteed password recovery for Adobe Acrobat Copyright (c[removed]ElcomSoft Co.Ltd. Contents

Add to Reading List

Source URL: www.elcomsoft.com

Language: English - Date: 2014-01-15 02:17:30
73Undertaking / Health / Emergency management / Grief counseling / Rainbow Hospice / Medicine / Emotions / Grief

2004—2005 ANNUAL REPORT Page 2 Table of Contents

Add to Reading List

Source URL: www.nalagvic.org.au

Language: English - Date: 2005-11-22 02:26:31
74Rainbow table / Key management / Password / Dictionary attack / Salt / Key derivation function / Random password generator / Key space / John the Ripper / Cryptography / Espionage / Cryptographic hash functions

Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff Arvind Narayanan and Vitaly Shmatikov

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2005-09-13 00:37:50
75Password / Rainbow table / Salt / One-time password / Cryptographic hash function / Crypt / Security token / Passphrase / Two-factor authentication / Security / Computer security / Cryptography

K:Journal ปีที่ 8 เล่มที่ 2

Add to Reading List

Source URL: suanpalm3.kmutnb.ac.th

Language: English - Date: 2013-01-28 01:59:46
76Provably secure cryptographic hash function / Preimage attack / Universal one-way hash function / Hash function / Collision resistance / SHA-1 / Rainbow table / Crypt / Hash list / Cryptographic hash functions / Cryptography / Error detection and correction

Provably Secure Cryptographic Hash Functions

Add to Reading List

Source URL: web.maths.unsw.edu.au

Language: English - Date: 2006-12-20 22:26:42
77Password / PBKDF2 / Brute-force attack / Bcrypt / Crypt / Key stretching / Rainbow table / Cryptography / Key management / Key derivation function

scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2011-10-27 15:49:52
78Espionage / Search algorithms / Hashing / Rainbow table / Password / John the Ripper / LM hash / Salt / Crypt / Cryptography / Cryptographic hash functions / Computer security

doi:[removed]j.diin[removed]

Add to Reading List

Source URL: dfrws.org

Language: English - Date: 2009-08-16 16:22:06
79Information retrieval / Artificial intelligence / Cryptographic hash functions / Error detection and correction / Hash function / Hash table / Key derivation function / Tabulation hashing / Rainbow table / Search algorithms / Cryptography / Hashing

scrypt.dvi

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2011-10-27 15:49:52
80Rainbow table / Computer programming / Information retrieval / Hashing / Hash function / Trie / Password / Cryptanalysis / Lookup table / Search algorithms / Cryptographic hash functions / Computing

PDF Document

Add to Reading List

Source URL: lasecwww.epfl.ch

Language: English - Date: 2009-11-18 09:27:19
UPDATE