Brute-force attack

Results: 59



#Item
11Brute-force attack / Side channel attack / Workshop on Cryptographic Hardware and Embedded Systems / MIFARE / Cryptography / Espionage / Advanced Encryption Standard

Real world AES key extraction CHES-2010 Rump Session, Santa Barbara, USA, 19 August 2010 Real world AES key extraction Sergei Skorobogatov

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2010-09-09 06:37:08
12Password / Key management / Crypt / John the Ripper / Key derivation function / Brute-force attack / Passwd / Botnet / OTPW / Cryptography / Computer security / Security

Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mc

Add to Reading List

Source URL: nsrc.cse.psu.edu

Language: English - Date: 2015-04-16 15:07:31
13Computer security / Denial-of-service attack / Transmission Control Protocol / Traffic flow / Deep packet inspection / Secure Shell / Sliding window protocol / Port knocking / Deep content inspection / Computer network security / Computing / Cyberwarfare

Flow-based Brute-force Attack Detection Martin Draˇsar, Jan Vykopal Masaryk University Institute of Computer Science Botanick´a 68a, Brno, Czech Republic Philipp Winter

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2014-05-26 09:37:41
14Public-key cryptography / Domain name system / Internet standards / Domain Name System Security Extensions / Key size / Key / Brute-force attack / Cryptanalysis / Key generation / Cryptography / Key management / Internet protocols

DNSSEC Key Maintenance Analysis_final

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:09
15Public-key cryptography / Domain name system / Internet standards / Domain Name System Security Extensions / Key size / Key / Brute-force attack / Cryptanalysis / Key generation / Cryptography / Key management / Internet protocols

DNSSEC Key Maintenance Analysis_final

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:09
16Data security / Encryption / DataLock Technology / Computing / USB 3.0 / Brute-force attack / Computer hardware / Computer security / USB / Disk encryption / Cryptographic software / Data management

Secure USB 3.0 Desktop Drive The world’s first PIN operated desktop hard drive with built-in hardware encryption and capacities of up to 6TB. Looking for the highest level of security for your data while utilising the

Add to Reading List

Source URL: www.istorage-uk.com

Language: English - Date: 2014-09-08 11:16:19
17Security / Espionage / Cyberwarfare / Key management / Brute-force attack / Key

IOActive Security Advisory Title Severity Critical

Add to Reading List

Source URL: www.ioactive.com

Language: English
18Electronics / Bcrypt / Cryptographic software / Computer architecture / Crypt / Multi-core processor / John the Ripper / Brute-force attack / Field-programmable gate array / Cryptography / Computing / GPGPU

Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware Katja Malvoni University of Zagreb, Croatia

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-05-03 17:37:18
19Finite fields / Electronic commerce / Key size / RSA / Key / Elliptic curve cryptography / Brute-force attack / XTR / Cryptanalysis / Cryptography / Public-key cryptography / Key management

J. Cryptology: 255–293 DOI: s00145 © 2001 International Association for Cryptologic Research Selecting Cryptographic Key Sizes

Add to Reading List

Source URL: infoscience.epfl.ch

Language: English - Date: 2011-07-09 03:55:16
20Artificial intelligence / Alan Turing / Transaction authentication number / Challenge-response authentication / Turing test / Brute-force attack / HTTP cookie / Brute-force search / Virtual Network Computing / CAPTCHA / System software / Computing

LNCSEnhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-11-28 11:08:41
UPDATE