Brute Force

Brute Force (2005, Copernicus Books) is a book by Matt Curtin about cryptography. In this book, the author accounts his involvement in the DESCHALL… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1981-2017
010203019812017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
The SSH Brute force attack is one of the most prevalent attacks in computer networks. These attacks aim to gain ineligible access… (More)
  • table I
  • table II
Is this relevant?
2014
2014
The tremendous growth in computer network and Internet usage, combined with the growing number of attacks makes network security… (More)
  • table I
  • table II
  • figure 1
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Brute force scanning of kernel memory images for finding kernel data structure instances is an important function in many… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
This work explores the problem of cross-lingual pairwise similarity, where the task is to extract similar pairs of documents… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 5
Is this relevant?
2010
2010
  • H. M. Faheem
  • 2010 The 12th International Conference on…
  • 2010
Motif finding problem is a major task to understand the mechanisms of gene expression regulation. Motif is generally defined as a… (More)
  • figure 1
  • table 6
  • table 5
  • table 3
  • table 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
The fuzzy vault approach is one of the best studied and well accepted ideas for binding cryptographic security into biometric… (More)
Is this relevant?
2007
2007
Bodily activities such as sports have many physical and mental health benefits. The associated physical interactions are often of… (More)
Is this relevant?
2005
2005
Extracting grammar from programs attracts researchers from several fields such as software engineering, pattern recognition… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
1998
1998
The Data Encryption Standard (DES) has been the workhorse of cryptography for some 20 years. Its wide deployment and small (by… (More)
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
1981
1981
We here examine the current state of brute-force chess programs. We are interested in their strong points and how these are… (More)
  • figure 5
  • figure 14
Is this relevant?