Brute Force

Results: 111



#Item
71Electronic engineering / OpenCL / Field-programmable gate array / Altera / Parallel computing / MD5 / Kernel / Password cracking / Brute-force attack / GPGPU / Computing / Software

FPGA performances in Cryptography Performance analysis of different cryptographic algorithms implemented in an FPGA Final Report Lubos Gaspar

Add to Reading List

Source URL: publications.jrc.ec.europa.eu

Language: English - Date: 2015-01-23 20:51:10
72Security / Hacking / United States Department of Homeland Security / National Cyber Security Division / Incident management / United States Computer Emergency Readiness Team / Stuxnet / SCADA / Vulnerability / Computer security / Cyberwarfare / Technology

April/May/June[removed]INCIDENT RESPONSE ACTIVITY BRUTE FORCE ATTACKS ON INTERNET-FACING CONTROL SYSTEMS

Add to Reading List

Source URL: ics-cert.us-cert.gov

Language: English - Date: 2013-09-16 17:06:27
73Computer security / Secure Shell / Password / Botnet / DenyHosts / Fail2ban / Brute-force attack / Denial-of-service attack / Computer network security / System software / Software

Detecting Stealthy, Distributed SSH Brute-Forcing † † Mobin Javed and Vern Paxson

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2013-08-27 00:25:43
74MinHash / Locality-sensitive hashing / Cosine similarity / Data mining / Jaccard index / Nearest neighbor search / Digital signature / Information science / Information retrieval / Search algorithms

No Free Lunch: Brute Force vs. Locality-Sensitive Hashing for Cross-lingual Pairwise Similarity Ferhan Ture1 , Tamer Elsayed2 , Jimmy Lin1,3 1 2

Add to Reading List

Source URL: www.umiacs.umd.edu

Language: English - Date: 2011-09-05 10:52:26
75Digital typography / Typesetting / Vector graphics markup languages / Donald Knuth / TeX / PostScript / Device independent file format / Graphics / HP LaserJet / Computing / Computer graphics / Typography

TUGboat, Volume[removed]), No. 2 ure environment; i.e. the figure prints by itself on a page separate from the BTEX document. Two solutions are: always include a prolog along with each Macintosh graphics (brute force) or

Add to Reading List

Source URL: tug.org

Language: English - Date: 2011-10-16 20:52:41
76Cryptographic software / Internet standards / Public-key cryptography / HTTP Secure / Key size / Brute-force attack / Password / SSL acceleration / Dynamic SSL / Cryptography / Secure communication / Cryptographic protocols

Microsoft Word - Security papers fore web site.doc

Add to Reading List

Source URL: www.centralbooks.com

Language: English - Date: 2009-09-21 08:00:22
77Brute-force search / Algorithm / Random walk / Hash table / Precomputation / Mathematics / Search algorithms / Statistics / Kangaroo

Kangaroos in Side-Channel Attacks Tanja Lange1 , Christine van Vredendaal1,2 , and Marnix Wakker2 1 Department of Mathematics and Computer Science Eindhoven University of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-21 04:21:53
78Law / Criminal law / Criminal justice / Zero tolerance / Probation / Right Realism / Feminist school of criminology / Criminology / Crime / Law enforcement

COPYRIGHT NOTICE: Mark A. R. Kleiman: When Brute Force Fails is published by Princeton University Press and copyrighted, © 2009, by Princeton University Press. All rights reserved. No part of this book may be reproduced

Add to Reading List

Source URL: press.princeton.edu

Language: English - Date: 2009-09-08 14:02:57
79Health / Microbiology / Anopheles / Plasmodium falciparum / Plasmodium malariae / DDT / Antimalarial medication / Artemisinin / Plasmodium ovale / Malaria / Medicine / Plasmodium

Anopheles vs. Plasmodium • Drug Design vs. Brute Force • Macha vs. Malaria nonprofit organization u.s. postage paid Bloomberg School of Public Health

Add to Reading List

Source URL: magazine.jhsph.edu

Language: English
80Password / Entropy / Salt / Public-key cryptography / Key / Brute-force attack / Password strength / Password cracking / Cryptography / Key management / Randomness

Cryptographic Key Generation from Voice (Extended Abstract) Fabian Monrose Michael K. Reiter

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:35
UPDATE