<--- Back to Details
First PageDocument Content
Data Encryption Standard / Reconfigurable computing / Digital electronics / Field-programmable gate array / MicroBlaze / Brute-force attack / Xilinx / DIMM / EFF DES cracker / Classes of computers / Cryptography / Electronic engineering
Date: 2006-12-12 16:42:39
Data Encryption Standard
Reconfigurable computing
Digital electronics
Field-programmable gate array
MicroBlaze
Brute-force attack
Xilinx
DIMM
EFF DES cracker
Classes of computers
Cryptography
Electronic engineering

Add to Reading List

Source URL: www.copacobana.org

Download Document from Source Website

File Size: 1,47 MB

Share Document on Facebook

Similar Documents

Computer access control / Obfuscation / Computer security / Cryptography / Password / Security / Brute-force attack / Password policy / Password psychology

Of Passwords and People: Measuring the Effect of Password-Composition Policies Saranga Komanduri1 , Richard Shay1 , Patrick Gage Kelley1 , Michelle L. Mazurek1 , Lujo Bauer1 , Nicolas Christin1 , Lorrie Faith Cranor1 , a

DocID: 1r4Lp - View Document

Computer access control / Computer security / Security / Cryptography / CAPTCHA / Password / Challengeresponse authentication / Transaction authentication number / Brute-force attack / Salt / Authentication / Password cracking

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

DocID: 1qRqP - View Document

Cryptography / Key management / Public-key cryptography / Internet Standards / Internet protocols / Domain Name System Security Extensions / Key / Brute-force attack / Cryptanalysis / Domain Name System / Encryption / Entropy

DNSSEC Key Maintenance Analysis_final

DocID: 1qEU7 - View Document

Computer network security / NT LAN Manager / Kerberos / Integrated Windows Authentication / Authentication protocol / Challengeresponse authentication / Password / Cain and Abel / Key distribution center / Electronic authentication / Brute-force attack / Pass the hash

Mitigating Service Account Credential Theft on Windows Reducing the risk of automated authentication against untrusted endpoints VersionLast Updated:

DocID: 1pG6u - View Document

Computing / Concurrent computing / Parallel computing / GPGPU / Computer architecture / Video cards / Graphics hardware / Cryptography / Key derivation function / Scrypt / Brute-force attack / Password cracking

Security of Key Derivation Functions Ewerton Rodrigues Andrade Advisor: Prof. Dr. Marcos Antonio Simplicio Junior ยด

DocID: 1nnoz - View Document