Rainbow table

Results: 83



#Item
21Table of Contents What’s New for 2015...............................................................2 Seasons, Daily Limits and Size Limits....................................6 Licences and Fees....................

Table of Contents What’s New for 2015...............................................................2 Seasons, Daily Limits and Size Limits....................................6 Licences and Fees....................

Add to Reading List

Source URL: www.gov.pe.ca

Language: English - Date: 2015-03-25 13:10:21
22A single NT hash can be used to access almost any data which resides in a Windows domain environment. The theory behind the first practical “Pass the Hash” attack against Microsoft Windows NT and the Lan Manager (LM)

A single NT hash can be used to access almost any data which resides in a Windows domain environment. The theory behind the first practical “Pass the Hash” attack against Microsoft Windows NT and the Lan Manager (LM)

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-07-22 18:04:53
23Enterprise Recipes with Ruby and Rails

Enterprise Recipes with Ruby and Rails

Add to Reading List

Source URL: media.pragprog.com

Language: English - Date: 2009-06-01 18:00:49
24STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2013-12-11 18:35:17
25Password Hashing Competition - Survey and Benchmark George Hatzivasilis1 , Ioannis Papaefstathiou1 , and Charalampos Manifavas2 1  2

Password Hashing Competition - Survey and Benchmark George Hatzivasilis1 , Ioannis Papaefstathiou1 , and Charalampos Manifavas2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-22 05:43:55
26An Algorithm for Approximate Membership Checking With Application to Password Security Udi Manber1 and Sun Wu Department of Computer Science University of Arizona

An Algorithm for Approximate Membership Checking With Application to Password Security Udi Manber1 and Sun Wu Department of Computer Science University of Arizona

Add to Reading List

Source URL: webglimpse.net

Language: English - Date: 2002-10-23 23:03:02
27Programming Assignment 1  Winter 2015 CS 255: Intro to Cryptography Due Feb. 13, 11:59pm

Programming Assignment 1 Winter 2015 CS 255: Intro to Cryptography Due Feb. 13, 11:59pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-02 11:42:01
28Cryptology ePrint Archive: Report[removed]This is the full version of the article presented at ACISP 2013 under the same title. LNCS 7959, pp.347–362. DOI: [removed][removed]3_24 Analysis of the Non-Perfect Tab

Cryptology ePrint Archive: Report[removed]This is the full version of the article presented at ACISP 2013 under the same title. LNCS 7959, pp.347–362. DOI: [removed][removed]3_24 Analysis of the Non-Perfect Tab

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-15 01:44:22
29Enough with the Insanity Dictionary Based Rainbow Tables Matt Weir Florida State University Shmoocon 2009

Enough with the Insanity Dictionary Based Rainbow Tables Matt Weir Florida State University Shmoocon 2009

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:40
30Post-Exploitation with WCE v1.2 Pass-the-Hash. Pass-the-ticket & more… Date: 01-07-2011 Author: Hernan Ochoa <hernan@ampliasecurity.com>

Post-Exploitation with WCE v1.2 Pass-the-Hash. Pass-the-ticket & more… Date: 01-07-2011 Author: Hernan Ochoa

Add to Reading List

Source URL: www.ampliasecurity.com

Language: English - Date: 2015-01-12 10:16:16