Back to Results
First PageMeta Content
Espionage / Search algorithms / Hashing / Rainbow table / Password / John the Ripper / LM hash / Salt / Crypt / Cryptography / Cryptographic hash functions / Computer security


doi:[removed]j.diin[removed]
Add to Reading List

Document Date: 2009-08-16 16:22:06


Open Document

File Size: 360,86 KB

Share Result on Facebook

Company

Adobe / Francis Group / Mathematics / Kent Ridge Digital Labs / Elsevier Ltd. / Yahoo / Microsoft / /

Country

United States / United Kingdom / Singapore / /

/

Facility

Hwei-Ming Ying Institute / National Institute of Standards and Technology / Imperial College / Nanyang Technological University / South Tower / Password cracker / /

IndustryTerm

password hash algorithm / storage media / Internet Protocols / software encryption / hash algorithm / password recovery tools / password cracking tool / password cracking tools / Internet Security / password hashing algorithm / hash algorithms / message-digest algorithm / 212th chain / Password recovery tool / /

OperatingSystem

Microsoft Windows / /

Organization

Imperial College London / Hwei-Ming Ying Institute for Infocomm Research / Nanyang Technological University / Singapore / Infocomm Research / Cryptography and Security Department / National Institute of Standards and Technology / Institute for Infocomm Research / /

Person

Oechslin / Cain / Abel / Ming Ying / /

/

Position

Acrobat / Corresponding author / /

Product

Sc / /

Technology

alpha / password hash algorithm / hash algorithm / Hellman algorithm / password hashing algorithm / message-digest algorithm / Optical Fiber / encryption / Cryptography / hash algorithms / http / software encryption / Acrobat / /

URL

http /

SocialTag