Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,664,976 papers from all fields of science
Search
Sign In
Create Free Account
Brute-force attack
Known as:
Brute-force attack/version 2
, Credential recycling
, Brute-force attacks
Expand
In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
40-bit encryption
AI-complete
Bicycle attack
Birthday attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Brute Force Attack pada Algoritma SHA-256
Sandromedo Christa Nugroho
Talenta Conference Series: Science and Technology…
2019
Corpus ID: 202765638
Brute force attack adalah salah satu serangan praktis (bersifat praktek) yang dapat digunakan untuk memecahkan teknik pengamanan…
Expand
2017
2017
Cryptanalysis of full round Fruit
Sabyasachi Dey
,
Santanu Sarkar
IACR Cryptology ePrint Archive
2017
Corpus ID: 133334
In FSE 2015, Armknetcht et al. proposed a new technique to design stream cipher. This technique involves repeated use of keybits…
Expand
2017
2017
Cracking PwdHash: A Bruteforce Attack on Client-side Password Hashing
D. Llewellyn-Jones
,
G. Rymer
2017
Corpus ID: 35803063
David Llewellyn-Jones thanks the European Research Council for funding this research through grant StG 307224 (Pico). Graham…
Expand
2013
2013
Flow-based Brute-force Attack Detection
Jan Vykopal
,
Martin Drašar
,
Philipp Winter
2013
Corpus ID: 8089963
Brute-force attacks are a prevalent phenomenon that is getting harderto successfully detect on a network level due to increasing…
Expand
2012
2012
Blocking of Brute Force Attack
G. Sowmya
,
D.JAMUNA
,
M.VENKATA
,
Krishna Reddy
,
M.Tech Scholor
2012
Corpus ID: 61430942
A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an…
Expand
2012
2012
Reduction of Dynamical Degradation in Chaotic Image Encryption System by Coupling Multiple Chaotic Maps and Perturbation
D. Chattopadhyay
,
Debashis Nandi
,
Mrinal Kanti Mondal
2012
Corpus ID: 14217518
Secure multimedia communication presents new challenges that are difficult to handle by using the currently adopted encryption…
Expand
2012
2012
PREVENTING BRUTE FORCE ATTACK THROUGH THE ANALYZING LOG
B. Qasim
,
M. Al-Musawi
2012
Corpus ID: 63014656
Secure Shell (SSH) is a secure remote login program which can be used in place of regular telnet. It has become the default…
Expand
2010
2010
Generating revocable fingerprint template using minutiae pair representation
Zhe Jin
,
A. Teoh
,
T. Ong
,
C. Tee
International Conference on Education Technology…
2010
Corpus ID: 13930762
With the growing concern for secure and private information protection, several issues pertaining to the traditional biometric…
Expand
2009
2009
Security Analysis of Hardened Retina Based Fuzzy Vault
V. Meenakshi
,
G. Padmavathi
International Conference on Advances in Recent…
2009
Corpus ID: 661228
Biometric techniques are gaining importance for personal authentication and identification. Biometric templates are vulnerable to…
Expand
2004
2004
The effectiveness of brute force attacks on RC4
N. Couture
,
K. B. Kent
Proceedings. Second Annual Conference on…
2004
Corpus ID: 14486230
The security of encryption algorithms depends heavily on the computational infeasibility of exhaustive key-space searches. We use…
Expand