Brute Force

Results: 111



#Item
41Data security / Encryption / DataLock Technology / Computing / USB 3.0 / Brute-force attack / Computer hardware / Computer security / USB / Disk encryption / Cryptographic software / Data management

Secure USB 3.0 Desktop Drive The world’s first PIN operated desktop hard drive with built-in hardware encryption and capacities of up to 6TB. Looking for the highest level of security for your data while utilising the

Add to Reading List

Source URL: www.istorage-uk.com

Language: English - Date: 2014-09-08 11:16:19
42Security / Espionage / Cyberwarfare / Key management / Brute-force attack / Key

IOActive Security Advisory Title Severity Critical

Add to Reading List

Source URL: www.ioactive.com

Language: English
43Health / Microbiology / Anopheles / Mosquito / DDT / Vector / Wolbachia / Antimalarial medication / Plasmodium berghei / Malaria / Medicine / Plasmodium

Anopheles vs. Plasmodium • Drug Design vs. Brute Force • Macha vs. Malaria nonprofit organization u.s. postage paid Bloomberg School of Public Health

Add to Reading List

Source URL: magazine.jhsph.edu

Language: English
44Electronics / Bcrypt / Cryptographic software / Computer architecture / Crypt / Multi-core processor / John the Ripper / Brute-force attack / Field-programmable gate array / Cryptography / Computing / GPGPU

Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware Katja Malvoni University of Zagreb, Croatia

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-05-03 17:37:18
45Finite fields / Electronic commerce / Key size / RSA / Key / Elliptic curve cryptography / Brute-force attack / XTR / Cryptanalysis / Cryptography / Public-key cryptography / Key management

J. Cryptology: 255–293 DOI: s00145 © 2001 International Association for Cryptologic Research Selecting Cryptographic Key Sizes

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:16
46Artificial intelligence / Alan Turing / Transaction authentication number / Challenge-response authentication / Turing test / Brute-force attack / HTTP cookie / Brute-force search / Virtual Network Computing / CAPTCHA / System software / Computing

LNCSEnhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-11-28 11:08:41
47Advanced Encryption Standard / Key size / Encryption / Universal Serial Bus / Brute-force attack / Comparison of encrypted external drives / Aloaha / Cryptography / Disk encryption / Cryptographic software

“With real-time AES hardware encryption, software free design and CESG CCTM accreditation, the iStorage diskG is the World’s most secure,

Add to Reading List

Source URL: www.istorage-uk.com

Language: English - Date: 2013-10-17 12:30:54
48Spamming / Computer security / Spam filtering / PHP programming language / Content management systems / WordPress / Spam in blogs / Anti-spam techniques / Denial-of-service attack / Software / Computing / Computer network security

Hardening WordPress (or, How Not To Get Hacked, Then What to Do When You Are) # Resources Codex Blog.Sucuri.net Add to Reading List

Source URL: dotgray.com

Language: English - Date: 2015-03-15 17:14:30
49Microbiology / Anopheles / Antimalarial medication / Tropical disease / Artemisinin / Plasmodium falciparum / Global health / Malaria No More UK / MIM Pan-African Malaria Conference / Malaria / Medicine / Health

Anopheles vs. Plasmodium • Drug Design vs. Brute Force • Macha vs. Malaria nonprofit organization u.s. postage paid Bloomberg School of Public Health

Add to Reading List

Source URL: magazine.jhsph.edu

Language: English
50Key size / Symmetric-key algorithm / Block ciphers / LEX / Cryptanalysis / Ciphertext / Cipher / XSL attack / Serpent / Cryptography / Advanced Encryption Standard / Brute-force attack

Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware Alex Biryukov and Johann Großsch¨adl University of Luxembourg Laboratory of Algorithmics, Cryptology and Security (LACS) 6, rue Richard Coudenhove-K

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-30 14:28:01
UPDATE