Brute-force attack

Known as: Brute-force attack/version 2, Credential recycling, Brute-force attacks 
In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
In the early days of network and service management, researchers paid much attention to the design of management frameworks and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2017
2017
In recent years, mobile is a very useful and important device for everyone because of it’s functionality. By the end of 2016… (More)
Is this relevant?
2015
2015
In this paper we compare and evaluate the effectiveness of the brute force methodology using dataset of known password. It is a… (More)
  • table II
  • table III
  • table I
  • table IV
  • table V
Is this relevant?
2015
2015
Secure storage of genomic data is of great and increasing importance. The scientific community's improving ability to interpret… (More)
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2014
2014
The Rigorous Examination of Reactive Systems’ (rers) Challenges provide a forum for experimental evaluation based on specifically… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2013
2013
Brute-force attacks are a prevalent phenomenon that is getting harder to successfully detect on a network level due to increasing… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2012
2012
The PRESENT cipher is symmetric block cipher with 64 bits of data block and 80 (or 128) bits of key. It is based on Substitution… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
The fuzzy vault approach is one of the best studied and well accepted ideas for binding cryptographic security into biometric… (More)
Is this relevant?
2008
2008
This paper presents an effective field-programmable gate array (FPGA)-based hardware implementation of a parallel key searching… (More)
  • figure 1
  • figure 2
  • table I
Is this relevant?
1999
1999
As computer technology improves, the security of specific ciphers and one-way hash functions periodically must be reevaluated in… (More)
Is this relevant?