Skip to search formSkip to main contentSkip to account menu

Brute-force attack

Known as: Brute-force attack/version 2, Credential recycling, Brute-force attacks 
In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
In the early days of network and service management, researchers paid much attention to the design of management frameworks and… 
Highly Cited
2014
Highly Cited
2014
We introduce honey encryption (HE), a simple, general approach to encrypting messages using low min-entropy keys such as… 
Highly Cited
2013
Highly Cited
2013
In this paper, a novel algorithm for image encryption based on the hyper-chaotic system is proposed. In order to generate the… 
2012
2012
A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an… 
Highly Cited
2007
Highly Cited
2007
A new stream cipher, Grain, is proposed. The design targets hardware environments where gate count, power consumption and memory… 
Highly Cited
2007
Highly Cited
2007
The fuzzy vault approach is one of the best studied and well accepted ideas for binding cryptographic security into biometric… 
Highly Cited
2007
Highly Cited
2007
The filter generator is an important building block in many stream ciphers. The generator consists of a linear feedback shift… 
Highly Cited
2007
Highly Cited
2007
We demonstrate an active attack on the WEP protocol that is able to recover a 104-bit WEP key using less than 40,000 frames with… 
Highly Cited
2002