Brute Force

Results: 111



#Item
81Applied mathematics / Keystroke dynamics / Password / Private biometrics / Key / Entropy / Pseudorandomness / Brute-force attack / Quantization / Biometrics / Cryptography / Security

Towards Practical Biometric Key Generation with Randomized Biometric Templates ∗ Lucas Ballard Google, Inc.

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2010-03-17 13:11:09
82Image processing / Template / Template matching / Software engineering / Computing / Solid-state drive

Problem Set 5 CMSC 426 Due: Thursday, May 8 Brute-Force, SSD matching. The class web page contains an image and a template that you can download. Your goal is to find the regions in the image that best match the templa

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2003-04-24 11:12:24
83Encryption / Keychain / Advanced Encryption Standard / Cold boot attack / Key derivation function / Brute-force attack / Dm-crypt / Password / Public-key cryptography / Cryptography / Disk encryption / Cryptographic software

Android Encryption Systems Peter Teufl, Andreas Fitzek, Daniel Hein, Alexander Marsalek, Alexander Oprisnik, Thomas Zefferer Institute for Applied Information Processing and Communications Graz University of Technology I

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2014-05-05 09:27:53
84Information theory / Asymptotic equipartition property / Mathematics

arXiv:1301.6356v3 [cs.IT] 13 May[removed]Brute force searching, the typical set and Guesswork Mark M. Christiansen and Ken R. Duffy Fl´avio du Pin Calmon and Muriel M´edard

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2013-05-14 03:56:14
85Security / Hacking / United States Department of Homeland Security / National Cyber Security Division / Incident management / United States Computer Emergency Readiness Team / Stuxnet / SCADA / Vulnerability / Computer security / Cyberwarfare / Technology

April/May/June[removed]INCIDENT RESPONSE ACTIVITY BRUTE FORCE ATTACKS ON INTERNET-FACING CONTROL SYSTEMS

Add to Reading List

Source URL: ics-cert.us-cert.gov

Language: English - Date: 2013-09-16 17:06:27
86Electronic commerce / Finite fields / Key size / RSA / Key / Brute-force attack / XTR / Cryptanalysis / Quantum computer / Cryptography / Public-key cryptography / Key management

Selecting Cryptographic Key Sizes Arjen K. Lenstra1 , Eric R. Verheul2 1 Citibank, N.A., and Technische Universiteit Eindhoven, 1 North Gate Road, Mendham, NJ[removed], U.S.A.,

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2003-06-05 07:41:02
87Stream ciphers / Field-programmable gate array / Cryptanalysis / Xilinx / Key size / A5/1 / SciEngines GmbH / Data Encryption Standard / Cryptography / Reconfigurable computing / Brute-force attack

Cryptanalysis with a cost-optimized FPGA cluster Jan Pelzl, Horst Görtz Institute for IT-Security, Germany UCLA IPAM Workshop IV

Add to Reading List

Source URL: www.copacobana.org

Language: English - Date: 2006-12-06 10:54:32
88Transport Layer Security / Encryption software / Cipher / Advanced Encryption Standard / Block cipher modes of operation / Brute-force attack / Chosen-plaintext attack / Key generation / Key / Cryptography / Initialization vector / Password

Motodev_Enterprise_Logo-Red-Black

Add to Reading List

Source URL: afu.com

Language: English - Date: 2013-03-29 15:25:36
89Pentomino / Polyomino / NP-complete problems / Theoretical computer science / Tetris / Algorithm / Brute Force / Polyform / Brute / Digital media / Games / Electronic games

Programming an open-source Pentominoes player using brute-force algorithms. Sebastien Vasey: [removed] Yann Schoenenberger: [removed] January 3, 2008

Add to Reading List

Source URL: kinonk.sourceforge.net

Language: English - Date: 2008-01-03 08:40:58
90Monoidal categories / Entailment / Monoid / Amenable group / Symbol / PRO / Enriched category / Orbifold / Abstract algebra / Algebra / Category theory

Notes Jason Reed March 15, 2007 – February 8, [removed]Sometimes we take some connective in a position where it is not invertible and by judgmental brute force make it so. For example, taking

Add to Reading List

Source URL: jcreed.org

Language: English - Date: 2009-10-03 17:03:22
UPDATE