Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,354,884 papers from all fields of science
Search
Sign In
Create Free Account
Brute-force attack
Known as:
Brute-force attack/version 2
, Credential recycling
, Brute-force attacks
Expand
In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
40-bit encryption
AI-complete
Bicycle attack
Birthday attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Flow-Based Web Application Brute-Force Attack and Compromise Detection
Rick Hofstede
,
M. Jonker
,
A. Sperotto
,
A. Pras
Journal of Network and Systems Management
2017
Corpus ID: 35695109
In the early days of network and service management, researchers paid much attention to the design of management frameworks and…
Expand
Highly Cited
2014
Highly Cited
2014
Honey Encryption: Security Beyond the Brute-Force Bound
A. Juels
,
Thomas Ristenpart
IACR Cryptology ePrint Archive
2014
Corpus ID: 14127621
We introduce honey encryption (HE), a simple, general approach to encrypting messages using low min-entropy keys such as…
Expand
Highly Cited
2013
Highly Cited
2013
A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos
Benyamin Norouzi
,
Seyed Mohammad Seyedzadeh
,
S. Mirzakuchaki
,
M. Mosavi
Multimedia tools and applications
2013
Corpus ID: 18012673
In this paper, a novel algorithm for image encryption based on the hyper-chaotic system is proposed. In order to generate the…
Expand
2012
2012
Blocking of Brute Force Attack
G. Sowmya
,
D.JAMUNA
,
M.VENKATA
,
Krishna Reddy
,
M.Tech Scholor
2012
Corpus ID: 61430942
A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an…
Expand
Highly Cited
2007
Highly Cited
2007
Grain: a stream cipher for constrained environments
Martin Hell
,
T. Johansson
,
W. Meier
International Journal of Wireless and Mobile…
2007
Corpus ID: 784379
A new stream cipher, Grain, is proposed. The design targets hardware environments where gate count, power consumption and memory…
Expand
Highly Cited
2007
Highly Cited
2007
The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack
P. Mihăilescu
,
A. Munk
,
Benjamin Tams
Biometrics and Electronic Signatures
2007
Corpus ID: 14346689
The fuzzy vault approach is one of the best studied and well accepted ideas for binding cryptographic security into biometric…
Expand
Highly Cited
2007
Highly Cited
2007
A New Attack on the Filter Generator
Sondre Rønjom
,
T. Helleseth
IEEE Transactions on Information Theory
2007
Corpus ID: 7357722
The filter generator is an important building block in many stream ciphers. The generator consists of a linear feedback shift…
Expand
Highly Cited
2007
Highly Cited
2007
Breaking 104 Bit WEP in Less Than 60 Seconds
Erik Tews
,
R. Weinmann
,
A. Pyshkin
Web Information System and Application Conference
2007
Corpus ID: 13965338
We demonstrate an active attack on the WEP protocol that is able to recover a 104-bit WEP key using less than 40,000 frames with…
Expand
Highly Cited
2005
Highly Cited
2005
Security Analysis of A Chaos-based Image Encryption Algorithm
Shiguo Lian
,
Jinsheng Sun
,
Zhiquan Wang
arXiv.org
2005
Corpus ID: 3263010
Highly Cited
2002
Highly Cited
2002
Biometric perils and patches
R. Bolle
,
J. Connell
,
N. Ratha
Pattern Recognition
2002
Corpus ID: 17066221
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE