Skip to search formSkip to main contentSkip to account menu

Brute-force attack

Known as: Brute-force attack/version 2, Credential recycling, Brute-force attacks 
In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Brute force attack adalah salah satu serangan praktis (bersifat praktek) yang dapat digunakan untuk memecahkan teknik pengamanan… 
2017
2017
In FSE 2015, Armknetcht et al. proposed a new technique to design stream cipher. This technique involves repeated use of keybits… 
2017
2017
David Llewellyn-Jones thanks the European Research Council for funding this research through grant StG 307224 (Pico). Graham… 
2013
2013
Brute-force attacks are a prevalent phenomenon that is getting harderto successfully detect on a network level due to increasing… 
2012
2012
A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an… 
2012
2012
Secure multimedia communication presents new challenges that are difficult to handle by using the currently adopted encryption… 
2012
2012
Secure Shell (SSH) is a secure remote login program which can be used in place of regular telnet. It has become the default… 
2010
2010
With the growing concern for secure and private information protection, several issues pertaining to the traditional biometric… 
2009
2009
Biometric techniques are gaining importance for personal authentication and identification. Biometric templates are vulnerable to… 
2004
2004
The security of encryption algorithms depends heavily on the computational infeasibility of exhaustive key-space searches. We use…