Back to Results
First PageMeta Content
Rainbow table / Key management / Password / Dictionary attack / Salt / Key derivation function / Random password generator / Key space / John the Ripper / Cryptography / Espionage / Cryptographic hash functions


Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff Arvind Narayanan and Vitaly Shmatikov
Add to Reading List

Document Date: 2005-09-13 00:37:50


Open Document

File Size: 155,24 KB

Share Result on Facebook

City

Alexandria / /

Company

Fiat / Los Alamos National Laboratory / Neural Information Processing Systems / Google / Passware / The Washington Post / /

Country

United States / /

Currency

USD / /

/

Event

Company Expansion / /

Facility

Vitaly Shmatikov The University of Texas / Los Alamos National Laboratory / /

IndustryTerm

speech recognition systems / generation algorithm / get_key algorithm / automaton algorithm / distinguished points algorithm / brute-force search / authentication infrastructure / search space enumeration algorithms / human information processing capacity / exhaustive key search / online implementation / recursive algorithm / password cracking tools / Password-based authentication systems / binary search / web browser cache / search space consisting / hybrid algorithm / natural language processing / password-authenticated cryptographic protocols / computing / larger search space / online dictionary / enumeration algorithm / search space / online dictionary attacks / prime algorithm / /

OperatingSystem

UNIX / /

Organization

University of Texas at Austin / Cognitive Science Society / United States Secret Service / IEEE Computer Society / /

Person

Jon Callas / Dmitry Sumin / Zhu Shuanglei / Vitaly Shmatikov / /

Position

Code breaking General / representative / /

ProgrammingLanguage

Javascript / /

ProvinceOrState

Virginia / /

PublishedMedium

Psychological Review / IEEE Transactions on Information Theory / Communications of the ACM / The Washington Post / /

Region

Benelux / /

Technology

FPGA / password-based protocols / speech recognition / t-1 / Viterbi algorithm / UNIX / distinguished points algorithm / INDEXING ALGORITHMS / Security Protocols / html / recursive algorithm / resulting algorithms / password-authenticated cryptographic protocols / two algorithms / Encryption / PAK-X protocol / Cryptography / enumeration algorithm / natural language processing / hybrid algorithm / search space enumeration algorithms / The get_key algorithm / generation algorithm / PAKE protocols / automaton algorithm / Nth prime algorithm / hashing algorithm / /

URL

http /

SocialTag