Password cracking

Results: 174



#Item
61Password / Randomness / John the Ripper / Entropy / Dictionary attack / OTPW / Random password generator / Cryptography / Security / Computer security

Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Rich Shay, Tim Vidas Lujo Bauer, Nicolas Christin, Lo

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-07-19 22:39:30
62Password / Security token / Crypt / Password cracking / OTPW / Security / Computer security / Access control

Encountering Stronger Password Requirements: User Attitudes and Behaviors Richard Shay Saranga Komanduri

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-07-19 22:34:09
63Cryptographic software / System software / Instruction set architectures / Password / Crypt / John the Ripper / ARM architecture / Central processing unit / Field-programmable gate array / Software / Computer architecture / Bcrypt

Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware Katja Malvoni (kmalvoni at openwall.com)

Add to Reading List

Source URL: www.openwall.com

Language: English - Date: 2014-08-19 09:20:20
64Computer security / Mac OS X / Computer law / Crimes / Password cracking / Password / System software / FileVault / Cryptography / Disk encryption / Cryptographic software

Contact: Nataly Koukoushkina Passware Inc. +1 (650) 472­3716 ext. 101 [removed]

Add to Reading List

Source URL: www.lostpassword.com

Language: English - Date: 2013-12-17 08:44:18
65Password / Cryptographic software / Identity management systems / Password strength / Password cracking / Security / Computer security / Access control

An Interactive Approach to Secure and Memorable Passwords

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2002-04-24 13:46:08
66Cryptographic hash functions / Salt / Rainbow table / Password cracking / Password / Dictionary attack / NTLM / Crack / MD5 / Cryptography / Computer security / Cyberwarfare

Enough with the Insanity Dictionary Based Rainbow Tables Matt Weir Florida State University Shmoocon 2009

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:40
67Search algorithms / Hashing / Password cracking / PBKDF2 / Salt / Password / Hash function / Crypt / Key derivation function / Cryptography / Cryptographic hash functions / Key management

Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs Marcos A. Simplicio Jr., Leonardo C. Almeida, Ewerton R. Andrade, Paulo C. F. dos Santos, and Paulo S. L. M. Barreto Escola Polit´ecni

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-27 11:02:00
68Cryptographic hash functions / Search algorithms / Salt / Password cracking / Password / Crypt / Hash function / SHA-1 / Passwd / Cryptography / Computer security / Error detection and correction

Major Marcell ([removed]) Hacktivity[removed]WRITING YOUR OWN PASSWORD

Add to Reading List

Source URL: marcellmajor.com

Language: English - Date: 2010-09-21 14:07:03
69Password / Disk encryption / Amazon Elastic Compute Cloud / Crypt / Password manager / Cloud computing / Computing / Centralized computing

Passware Takes Password Cracking Into the Cloud

Add to Reading List

Source URL: www.lostpassword.com

Language: English - Date: 2011-03-22 17:02:29
70Relational database management systems / Access control / Cross-platform software / Oracle Database / Oracle Corporation / Password cracking / Password / Default password / Role-based access control / Security / Software / Computing

Oracle_Security_Webinar_sep_23_2008

Add to Reading List

Source URL: www.petefinnigan.com

Language: English - Date: 2008-09-25 09:21:38
UPDATE