Brute-force attack

Results: 59



#Item
41Stream ciphers / Field-programmable gate array / Cryptanalysis / Xilinx / Key size / A5/1 / SciEngines GmbH / Data Encryption Standard / Cryptography / Reconfigurable computing / Brute-force attack

Cryptanalysis with a cost-optimized FPGA cluster Jan Pelzl, Horst Görtz Institute for IT-Security, Germany UCLA IPAM Workshop IV

Add to Reading List

Source URL: www.copacobana.org

Language: English - Date: 2006-12-06 10:54:32
42Transport Layer Security / Encryption software / Cipher / Advanced Encryption Standard / Block cipher modes of operation / Brute-force attack / Chosen-plaintext attack / Key generation / Key / Cryptography / Initialization vector / Password

Motodev_Enterprise_Logo-Red-Black

Add to Reading List

Source URL: afu.com

Language: English - Date: 2013-03-29 15:25:36
43Transport Layer Security / Encryption software / Cipher / Advanced Encryption Standard / Block cipher modes of operation / Brute-force attack / Chosen-plaintext attack / Key generation / Key / Cryptography / Initialization vector / Password

Motodev_Enterprise_Logo-Red-Black

Add to Reading List

Source URL: www.afu.com

Language: English - Date: 2013-03-29 15:25:36
44Password / Cryptographic software / Cryptographic hash functions / Crypt / Salt / SQL injection / Brute-force attack / SHA-2 / Bcrypt / Cryptography / Computer security / Security

Creating a secure web application through the implementation of password and plaintext encryptions Nisarga Patel Mentored by Mr. Wing Young Introduction

Add to Reading List

Source URL: www.scienceandmathacademy.com

Language: English - Date: 2013-06-10 13:55:15
45EFF DES cracker / RC5 / Brute-force attack / Electronic Frontier Foundation / RSA / Advanced Encryption Standard / RSA Secret-Key Challenge / DES Challenges / Cryptography / Data Encryption Standard / Distributed.net

1 of 2 http://www1.distributed.net/des/release-desiii.txt

Add to Reading List

Source URL: www.distributed.net

Language: English - Date: 2009-08-11 20:17:08
46Key management / Brute-force attack / A5/1 / EFF DES cracker / Cipher / Block cipher / Symmetric-key algorithm / Weak key / Advantage / Cryptography / Data Encryption Standard / Stream ciphers

TCSI[removed]..16

Add to Reading List

Source URL: www.sciengines.com

Language: English - Date: 2009-08-11 09:06:39
47Cipher / Key size / Key / Encryption software / Symmetric-key algorithm / One-time pad / Brute-force attack / Export of cryptography in the United States / Encryption / Cryptography / Key management / Public-key cryptography

ed[removed]Cipher Machines & Cryptology © [removed]D. Rijmenants

Add to Reading List

Source URL: users.telenet.be

Language: English - Date: 2013-08-25 06:00:09
48Key size / Brute-force attack / 40-bit encryption / Key / Symmetric-key algorithm / Cipher / Public-key cryptography / Strong cryptography / RC4 / Cryptography / Key management / Data Encryption Standard

Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security A Report by an Ad Hoc Group of

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2001-08-05 13:50:14
49Password / PBKDF2 / Brute-force attack / Bcrypt / Crypt / Key stretching / Rainbow table / Cryptography / Key management / Key derivation function

scrypt: A new key derivation function - Doing our best to thwart TLAs armed with ASICs

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2011-10-27 15:49:52
50Key size / Cryptanalysis / Key / Symmetric-key algorithm / Cryptosystem / RSA / Brute-force attack / Block cipher / Data Encryption Standard / Cryptography / Key management / Public-key cryptography

Key Lengths Contribution to The Handbook of Information Security

Add to Reading List

Source URL: www.keylength.com

Language: English - Date: 2013-02-26 03:11:08
UPDATE